KATHOLIEKE UNIVERSITEIT LEUVEN
-
Upload
khangminh22 -
Category
Documents
-
view
1 -
download
0
Transcript of KATHOLIEKE UNIVERSITEIT LEUVEN
KATHOLIEKE UNIVERSITEIT LEUVEN FACULTY OF THEOLOGY AND RELIGIOUS STUDIES
FROM INDIVIDUAL PRIVACY TO SOCIAL
CONUNDRUM
AN ETHICAL EXPLORATION OF THE TECHNOLOGICAL
SURVEILLANCE IN THE ORGANIZATIONAL WORKPLACE
A dissertation presented in partial fulfilment
of the requirements for the
Doctor’s Degree (Ph.D.) in Theology (S.T.D)
Supervisor by
Prof. Dr. Johan VERSTRAETEN Jijo James INDIPARAMBIL
2018
ACKNOWLEDGEMENTS
I wish to express my deep and profound sentiments of appreciation and gratitude to all who
contributed to the completion of this dissertation in one way or another. Acknowledging the great
passage of God’s generous and benevolent disposition towards me, I thank and praise Him for
granting me what I need all throughout my life through His unending goodness and enduring love.
Above all others, I remember with grate gratitude Prof. Dr. Johan Verstraeten, my promoter, for
offering me insightful feedback and enthusiastic encouragement throughout this project that
ultimately made it something I truly feel proud of. His remarkable competence, unfailing scholarship,
academic precision, penetrating insight and prone critique, and warm hospitality have led me to walk
unambiguously through the maze of my academic life. My respected intellectual mentor’s scholarly
corrections have directed this dissertation to reach through a convoluted layout to its final form. His
meticulous guidance ranged from the topic selection to the revision of the outline to the final draft.
No words can convey how truly thankful I am for his intellectual guidance and for both academic
and fraternal mentorship.
I would like to record my sincere gratitude to the reading committee of my dissertation: Prof. Luc
Van Liedekerke, Prof. Domènec Melé and Prof. Johan De Tavernier for their in-depth patience to a
meticulous and systematic reading of the text, and for their valuable and insightful comments,
inspiration and questions which incented me to widen my research from various perspectives. I would
especially thank Prof. Johan Leemans, the vice dean for research of the Faculty of Theology and
Religious Studies and the chair of the reading committee and of the public defense of my dissertation.
I am also greatly indebted to all my Professors at the Faculty of Theology and Religious Studies, KU
Leuven. My special thanks to Prof. Johan De Tavernier, the present Dean, the former Deans of the
Faculty, and present and former Vice-deans of Research, Prof. Thomas Knieps, the secretary for
research, for their support and guidance during my research at this Faculty. I recall with gratitude all
the library staff of the Faculties of Theology, Sociology and Economics and all our administrative
staff especially Mrs. Ingrid Wouters and Evelien Denecker for all their assistance and support. I also
express my sincere gratitude to the Faculty and its financial committee and all its contributors for the
financial support of my higher studies and research at KU Leuven. Thanks too to my academic
colleagues at the Faculty of Theology for their insightful discussions, constructive suggestion and
evaluations.
This dissertation is a product of various field-visits, surveys, empirical study and interviews. I would
like to express my profound gratitude to all individuals and institutions for playing a positive role for
this achievement. A special note of thanks is also due to Dr. Richard Kocher, Jonathan Sozek, Veenus
Joseph, Gijesh Thomas, Shinto George and Jaya Therese for their many forms of support and
technical assistance. A very special thanks is due to Sebeesh Jacob for portraying his amazing artistic
talent to design a very meaningful cover page to this dissertation.
With a grateful heart I remember and thank Prof. Gabriel Quicke, the president, the former presidents,
the staff, and the international student community at Holy Spirit College, Leuven, for their cordial
friendship and for our lively community life. More personally, I extend my thanks to several friends
and colleagues, priests and sisters and especially the Kerala priests’ community in the Holy Spirit
College for their companionship during my stay in Leuven.
Being a vowed member of the Congregation of the St. Therese of Child Jesus (CST), my sincere
gratitude goes also to my present and previous religious superiors for gifting me with the privilege
iv
Acknowledgements
to pursue my research at KU Leuven. Moreover, my thankfulness is due to Jojo Varakukalayil, Sain
Vadakkan, Gigy Purayidathil, Linto Kallukulangara, Renny Paruthikattil, and Manu Kaithaparambil,
my religious co-pilgrims during my stay in Leuven.
I am also specifically indebted to both my immediate and extended family. Though the graduate
process is largely incomprehensible to them, they remained supportive and very proud. I deeply
acknowledge the love and care of my parents, siblings and family members, whom I keep ever close
to my heart. And finally, last but by no means least, my sincere thanks also to everyone in the Kerala
community, Leuven, for being a hub of great sharing of acquaintance, cheerfulness and friendship
during last four years.
Years of learning enabled me to open my narrow-minded thinking, widen my limited academic
expertise, and leap daringly into a future there out, unknown and undiscovered. Thanks to KU
Leuven…!
Jijo James Indiparambil KU Leuven, December 2018
TABLE OF CONTENTS
ACKNOWLEDGEMENTS ........................................................................................................... III
TABLE OF CONTENTS ................................................................................................................ V
ABBREVIATIONS ........................................................................................................................ XI
BIBLIOGRAPHY ......................................................................................................................... XV
GENERAL INTRODUCTION ....................................................................................................... 1
CHAPTER ONE
TECHNOLOGY REVISITED: TOWARDS REPRESENTATIONAL PRACTICES OF
SURVEILLANCE
1.0 Introduction .......................................................................................................................... 11
1.1 Technology and Surveillance: Present Landscape ............................................................ 11
1.1.1 Technology, Workplace and Surveillance: A Conceptual Analysis ............................... 12
1.1.2 Surveillance as Part of Organizational Behaviour .......................................................... 16
1.1.3 Traditional versus Contemporary Electronic (& Cyber) Surveillance ............................ 18
1.1.4 Workplace Surveillance Acts and Other Federal, Constitutional Policies ...................... 20
1.2 Electronic Surveillance Frameworks ................................................................................. 26
1.2.1 The Metaphor of the Panopticon: Structured, Controlled Mechanism ............................ 27
1.2 2 Agency Theory: Process of Hierarchical Regimentation ................................................ 28
1.2.3 Procedural Justice (Fairness) Theory: Principles of Just Bustle ..................................... 30
1.2.4 Information Boundary Theory: Enhancing Central Contour........................................... 31
1.2.5 Structural-Perceptual Model: An Integrated Regime? .................................................... 33
1.3 The Gadgets of “New” Workplace Surveillance ............................................................... 33
1.3.1 Proximity of Access Panels and Audio-Visual Surveillance .......................................... 34
1.3.2 i-Spy: Emergence of Epoch-Making Digitalized Surveillance ........................................ 35
1.3.3 Location-Based Services: From ‘on-the-job’ to ‘off-the-job’ Surveillance..................... 38
1.4 Reasons and Logical Measures Behind the Workplace Surveillance .............................. 39
1.4.1 Promoting Measures: General Causative Factors of Surveillance .................................. 40
1.4.2 Proliferating Measures: Coercive Control and Caring .................................................... 41
1.4.3 Prophylactic Measures: Productivity, Security, and Liability Alleviation ...................... 43
vi
Table of Contents
1.5 The Aftermath: Pros-Cons Polemics Of Workplace Surveillance ................................... 45
1.5.1 The Expected Benefits of Surveillance ........................................................................... 45
1.5.2 The Clustering of Invisible Consequences ...................................................................... 48
1.6 Conclusion ............................................................................................................................. 52
CHAPTER TWO
INDIAN PROSPECTS FOR SOCIO-ECONOMIC ADVANCEMENT AND THE PLACE
OF EMPLOYEE SURVEILLANCE
2.0 Introduction .......................................................................................................................... 55
2.1 Work-Culture and Economic Sectors in India Today ...................................................... 55
2.1.1 The Traditional and the Current Organizational Work Culture in India ......................... 56
2.1.2 Indian Labour Laws and Rights ...................................................................................... 62
2.1.3 IT Industry and Services: The Alteration of Indian Economic Sectors ........................... 64
2.1.4 The IT Workforce as Vanguard of a New Indian Working Class ................................... 69
2.2 Labour (Employment) Trends and Challenges in Globalized IT-India .......................... 73
2.3 Employee Surveillance as a Modern Workplace Challenge in India .............................. 77
2.3.1 Indian Circumstantial Rationale behind the Workplace Surveillance ............................. 78
2.3.2 India’s Legal Frameworks Governing the Workplace Surveillance ............................... 81
2.3.3 Employee Concerns: Power Control and Workplace Bullying ....................................... 83
2.3.4 A Case Study Analysis: The Indian Call Center (BPO) Industry .................................... 85
2.4 Conclusion ............................................................................................................................. 90
CHAPTER THREE
WORKPLACE SURVEILLANCE AND PRIVACY: AN INDIVIDUAL RIGHTS
PERSPECTIVE
3.0 Introduction .......................................................................................................................... 93
3.1 Conceptual Reading and Developments of Privacy .......................................................... 93
3.1.1 Legalistic, Individualistic and Pluralistic Perspectives on Privacy ................................. 96
3.1.2 Critiques of Privacy Arguments .................................................................................... 102
3.1.3 Pro-Privacy Prospects and Positions ............................................................................. 106
3.2 Workplace Surveillance and Privacy Issues: Indian Scenario ....................................... 111
3.2.1 Impacts of Snooping Eye in Indian Call Centres .......................................................... 112
3.2.2 Data Security, Personal Space, Data Mining and Identity Theft ................................... 114
3.2.3 Workplace (Cyber) Bullying and Victimization ........................................................... 118
3.3 Exploring the Taxonomy of Workplace (Informational) Privacy .................................. 120
3.3.1 Information Collection and Privacy .............................................................................. 121
Table of Contents
vii
3.3.2 Information Processing and Privacy.............................................................................. 122
3.3.3 Information Dissemination and the Invasion of Privacy ............................................... 123
3.3.4 The General Data Protection Regulation (GDPR) and Data Privacy ............................ 125
3.3.5 Recommendations for a Leading Data Privacy ............................................................. 129
3.4 Workplace Surveillance and Individual Rights Perspective .......................................... 133
3.4.1 Privacy as a Fundamental Moral Right in the Workplace ............................................. 134
3.4.2 Privacy as the Right to Control Access to one’s Personal Affairs ................................ 140
3.4.3 Privacy as Prima Facie Right in the Workplace ........................................................... 143
3.5 Conclusion ........................................................................................................................... 145
CHAPTER FOUR
POWER DISTANCE AND ‘SOCIAL SORTING’: EFFECTS OF SURVEILLANCE
BEYOND PRIVACY
4.0 Introduction ........................................................................................................................ 147
4.1 Social Sorting: A New Mechanism Beyond Privacy ........................................................ 148
4.1.1 Regrettable Reductionism: Human Beings as “Coded” Data Subjects ......................... 150
4.1.2 Searchable Databases and Digital Redlining ................................................................. 152
4.1.3 The Regime of Regulating Mobilities and Virtual Existence ....................................... 153
4.2 Workplace Surveillance and Employee Sorting .............................................................. 155
4.2.1 Statistical Surveillance and Discrimination .................................................................. 156
4.2.2 From Embodied Persons to Disembodied Information ................................................. 158
4.2.3 Surveillance Creep and “At Risk” Categorization ........................................................ 159
4.2.4 Electronic Mediation and Face/Facelessness ................................................................ 161
4.2.5 Gender-Based Discrimination (the Male Gaze) ............................................................ 162
4.3 Surveillance, Organizational Life and Power Culture .................................................... 164
4.3.1 Surveillance Portrays Power Control ............................................................................ 166
4.3.2 Beyond the Normalizing Effect: Discipline and Control after Foucault ....................... 168
4.3.3 Technology Mediated Power Control and Disempowering Experience ....................... 170
4.4 Behavioural Effects Of Employee Sorting And Control ................................................. 173
4.4.1 Unsettled Stress, Emerging Distrust and Deviances ..................................................... 175
4.4.2 The Loss of Self-Determination and Self-Identity ........................................................ 179
4.4.3 Effects on Social Process: The Curtailment of Extra-Role Behaviours ........................ 180
4.5 A Digitalized Caste System and Employee Colonizing: The Indian Scenario .............. 182
4.5.1 A New Caste Structure through Digital Colonizing ...................................................... 183
4.5.2 Behavioural Deviances in Work-Life Attitudes and Practices ...................................... 185
viii
Table of Contents
4.5.3 Surveillance, Occupational Violence and Anti-Social Behaviours ............................... 189
4.6 Conclusion ........................................................................................................................... 191
CHAPTER FIVE
A QUALITATIVE INSPECTION OF EMPLOYEE SURVEILLANCE IN INDIA
5.0 Introduction ........................................................................................................................ 193
5.1 Research Methodology ....................................................................................................... 194
5.2 Sample Collection ............................................................................................................... 196
5.3 Result Section (Data Analysis) .......................................................................................... 199
5.3.1 Result Analysis - Sample A ........................................................................................... 199
5.3.2 Result Analysis - Sample B ........................................................................................... 206
5.4 Discussion of the Results [Samples A & B] ...................................................................... 210
5.4.1 The Scope of the Phenomenographic Approach ........................................................... 211
5.4.2 Against the Performance, Productivity, and Security Claims ....................................... 212
5.4.3 In Defence of Privacy, Impartial Treatment and Dignity .............................................. 215
5.4.4 Other Major Employee Concerns .................................................................................. 217
5.5 Electronic Surveillance: A Poor Solution To Workplace Concerns .............................. 220
5.6 Limitations of the Study..................................................................................................... 222
5.7 Conclusion ........................................................................................................................... 223
CHAPTER SIX
AN ETHICAL RETHINKING OF WORKPLACE SURVEILLANCE AND MANAGERIAL
BEHAVIOUR
6.0 Introduction ........................................................................................................................ 225
6.1 A New Beneficiary View of Workplace and Surveillance Ethics ................................... 225
6.1.1 Defining Workplace Ethics and Workplace Surveillance Ethics .................................. 227
6.1.2 Beyond the Limits of Managerial Rationality ............................................................... 230
6.1.3 Corporate Codes of Ethics for Workplace Behaviour, and Beyond .............................. 233
6.1.4 The Integration of Ethical Theories as Prerequisite for Moral Assessment .................. 235
6.2 Classical Approaches of Ethical Reasoning and Their Relevance for Workplace
Surveillance ............................................................................................................................... 237
6.2.1 A Tripartite (Eclectic) Reading of Workplace Surveillance ......................................... 241
6.2.2 Ethics of Rights, Power and Social Justice ................................................................... 249
6.2.3 The Irreducibility of the Person and the Ethics of Big Data and the Body-Subject ...... 254
6.3 An Amalgamation of an Embedded Religious-Ethical Framework .............................. 260
6.3.1 The Hindu View of Moral Standards in Management Ethics ....................................... 263
Table of Contents
ix
6.3.2 Ethical Tenets of Other Major Religions ...................................................................... 268
6.3.3 Catholic Social Thought and the Call for a New Managerial Ethics............................. 273
6.3.4 Christian Personalism and Meaningful Employment Practices .................................... 278
6.4 Conclusion ........................................................................................................................... 283
CHAPTER SEVEN
LABOURER VALUED MANAGEMENT AND SELF-MONITORING: A PERSON-
CENTERED MANAGERIAL PARADIGM FOR THE WORKPLACE
7.0 Introduction ........................................................................................................................ 287
7.1 Historical and Contemporary Management Theories and Models ............................... 288
7.1.1 Evolving Theories of and Approaches to Management ................................................ 288
7.1.2 Recent Developments in Management Approaches ...................................................... 291
7.1.3 The Sociotechnical and Personalist Expanse of Management ...................................... 293
7.1.4 Purposeful Organization and Sustainable Human Resource Management ................... 296
7.2 Labourer Valued Management (LVM): An Integrative Ethical Alternative ............... 300
7.2.1 LVM: Echoing Employees’ Dignity, Rights and Justice .............................................. 300
7.2.2 Corporate Citizenship and Transactional, Participatory, and Recognition Ethics ........ 306
7.2.3 Organizational Identification and Organizational Justice ............................................. 309
7.2.4 LVM and Rehumanizing Workplace ............................................................................ 311
7.3 Self-Monitoring [Self-Regulation] as a Human Development Alternative ................... 314
7.3.1 Authentic Self-Direction, Creating Capabilities and Self-Monitoring .......................... 321
7.3.2 The Symmetry of Trust and the Transparency for Self-Monitoring ............................. 325
7.3.3 The Notion of Just-Care and Self-Monitoring .............................................................. 329
7.3.4 Personal, Corporate and Social Integrity and Self-Monitoring ..................................... 332
7.4 Domènec Melé and a Harmonizing Personalist Management Review .......................... 336
7.4.1 Integrating Personalist and Common Good Principles ................................................. 337
7.4.2 The Organization as a Community of Persons .............................................................. 339
7.4.3 Humanizing/Rehumanizing the Culture in Organizations ............................................ 343
7.4.4 Human Quality Treatment (HQT) in the Workplace: A Personalist Review ................ 346
7.5 Conclusion ........................................................................................................................... 349
GENERAL CONCLUSION ........................................................................................................ 351
ABBREVIATIONS
ACD Automatic Call Dialing System
AHT Average Handling Time
AMA American Management Association
ANPP Australian Net Primary Productivity
APEC Asia-Pacific Economic Cooperation
BCE Before Common Era
BPO Business Process Outsourcing
BSM Behavioural Self-Monitoring
CA Centesimus Annus
CCTNS Crime and Criminal Tracking Network System
CCTV Closed-Circuit Television
CERT-In Indian Computer Emergency Response Team
CFAA Computer Fraud and Abuse Act
CH Catholic Humanism
CMS Central Monitoring System
CNIL La Commission nationale de l’informatique et des libertés
CSDC Compendium of the Social doctrine of the Church
CST Catholic Social Teaching
CiV Caritas in Veritate
DCE Deus Caritas Est
DPA Data Protection Act
ECHR European Convention on Human Rights
ECHR European Court of Human Rights
xii
Abbreviations
ECPA Electronic Communications Privacy Act
EG Evangelii Gaudium
EPZs Export Processing Zones
EU European Union
EUDPD EU Data Protection Directives
FDI Foreign Direct Investment
FEPA Federal Employee Polygraph Protection Act
FTC Federal Trade Commission
GDPR General Data Protection Regulation
GIS Geographic Information Systems
GPS Global Positioning System
HRM Human Resource Management
HQT Human Quality Treatment
HRA Human Rights Acts
IBT Information Boundary Theory
ICCPR International Covenant on Civil and Political Rights
ICTs Information and Communication Technologies
ILO International Labour Organization
IT Information Technology
ITA Information and Technology Act
ITES Information Technology Enabled Service
JIT Just-In-Time
KPO Knowledge Processing Outsourcing
LBS Location-Based Services
Abbreviations
xiii
LE Laborem Exercens
LPT Labour Process Theory
LS Laudato Si
LVM Labourer Valued Management
MICs Major Indian Companies
MM Mater et Magistra
MNCs Multinational Companies
NCTC National Counter Terrorism Center
NIG National Intelligence Grid
NLRA National Labour Relations Act
NSSO National Sample Survey Office
OB Organizational Behaviour
OECD Organization for Economic Cooperation and Development
PC Personal Computer
PDPB Personal Data Protection Bill
PETs Privacy-Enhancing Technologies
PIPEDA Personal Information Protection and Electronic Documents Act
PP Populorum Progressio
QWL Quality of Working Life
RFID Radio Frequency Identification
RN Rerum Novarum
SC Sacramentum Caritatis
SEZ Special Economic Zones
SIP Social Information Processing
xiv
Abbreviations
SMEs Small/Medium Enterprises
SOEs State-Owned Enterprises
SOHO Small Offices and Home Offices
SPM Structural-Perceptual Model
TQM Total Quality Management
TUs Trade Unions
UDHR Universal Declaration of Human Rights
UID Unique Identification
BIBLIOGRAPHY
A. Books
Agarwala, P.N. A Comprehensive History of Business in India – From 3000 BC to 2000 AD. New
Delhi: Tata McGraw-Hill, 2001.
Altman, Steven, Enzo Valenzi and Richard M. Hodgetts. Organizational Behaviour: Theory and
Practice. Orlando: Academic Press, INC, 1985 (revised publisher: Elsevier, 2013).
Amato, Joseph. Mounier and Maritain: A French Catholic Understanding of the Modern World.
Alabama: University of Alabama Press, 1975.
Aneesh, A. Virtual Migration: The Programming of Globalization. Durham: Duke University Press,
2006.
Aquinas, Thomas. Summa Theologiae: A Concise Translation, ed. Timothy McDermott.
Westminster: Christian Classics, 1989.
Arendt, Hannah. On Revolution. New York: Viking, 1965.
Aswathappa, K. Human Resource Management: Text and Cases, 7th ed. New Delhi: McGraw Hill
Education (India) Pvt. Ltd., 2013.
Baarda, Carolyn W. Computerized Performance Monitoring: Implications for Employers, Employees
and Human Resource Management. Kingston, ON: IRC Queen’s University, 1994.
Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet, 3rd ed.
New Jersey: Pearson Prentice Hall, 2009.
Bainbridge, David I. Introduction to Computer Law, 5th ed. Esse, England: Pearson Education Ltd.,
2004.
Bandura, Albert. Social Learning Theory. New York: General Learning Press, 1971.
Bandura, Albert and Richard H. Walters. Social Learning and Personality Development. New York:
Holt, Rinehart, and Winston, 1963.
Banerjee, Subhabrata Bobby. Corporate Social Responsibility: The Good, the Bad and the Ugly.
Cheltenham, UK: Edward Elgar, 2007.
Barendt, Eric, ed. Privacy. Oxon: Routledge, 2017.
Barth, Steven R. Corporate Ethics: The Business Code of Conduct for Ethical Employees. Boston,
MA: Aspatore, 2003.
Baudrillard, Jean. Simulations. New York: Semiotext(e), 1983.
Beauchamp, Tom L. and Norman E. Bowie. Ethical Theory and Business, 7th ed. Upper Saddle River,
NJ: Pearson/Prentice Hall, 2004.
Bibliography
xvi
Beck-Gernsheim, Elisabeth and Ulrich Beck. Individualization: Institutionalized Individualism and
Its Social and Political Consequences. London: Sage, 2002.
Benner, Chris. Work in the New Economy: Flexible Labour Markets in Silicon Valley. Oxford:
Blackwell, 2002.
Bennett, Colin J. and Charles E. Raab. The Governance of Privacy: Policy Instruments in Global
Perspective. Cambridge, MA: MIT Press, 2006.
Bentham, Jeremy. The Works of Jeremy Bentham. New York: Russell & Russell, 1962.
Berg, Bruce L. Qualitative Research Methods for the Social Sciences. London: Pearson, 2007.
Biao, Xiang. Global “Body Shopping”: An Indian Labour System in the Information Technology
Industry. Princeton: Princeton University Press, 2007.
Bork, Robert. The Tempting of America: The Political Seduction of the Law. New York: Pantheon,
1990.
Bowie, Norman E. Business Ethics: A Kantian Perspective. Malden: Blackwell, 1999.
Bowker, Geoffrey C. and Susan Leigh Star. Sorting Things Out: Classification and its Consequences.
Cambridge, MA: MIT Press, 1999.
Brains, Craig L., Jarol B. Manheim, Lars B. Willnat and Richard C. Rich. Empirical Political
Analysis 8th ed. Boston, MA: Longman. 2011.
Braverman, Harry. Labor and Monopoly Capital: The Degradation of Work in the Twentieth
Century. New York: NYU Press, 1998.
Bredeson, Dean A. and Keith Goree. Ethics in the Workplace, 3rd ed. Mason, OH: South-Western
Cengage Learning, 2012.
Brehm, Jack W. A Theory of Psychological Reactance. New York: Academic Press, 1966.
Brehm, Sharon S. and Jack W. Brehm. Psychological Reactance: A Theory of Freedom and Control.
San Diego, CA: Academic Press, 1981.
Brin, David. The Transparent society: Will Technology Force Us to Choose between Privacy and
Freedom? Massachusetts: Perseus Books, 1998.
Brown, Marvin T. Corporate Integrity: Rethinking Organizational Ethics and Leadership.
Cambridge: Cambridge University Press, 2005.
Brusseau, James. Business Ethics Workshop. Irvington, NY: Flat World Knowledge, 2011.
Budhwar, Pawan S. and Bhatnagar, Jyotsna. The Changing Face of People Management in India.
London: Routledge, 2009.
Bibliography
xvii
Business Roundtable. Corporate Ethics: A Prime Business Asset. New York: Business Roundtable,
1988.
Capizzi, Joseph E. and Andrew V. Abela. A Catechism for Business: Tough Ethical Questions and
Insights from Catholic Teachings, 2nd ed. Washington: Catholic University of America Press,
2016.
Cate, Fred H. Privacy in the Information Age. Washington, DC: Brookings Institute Press, 1997.
Chappell, Duncan and Vittorio Di Martino. Violence at Work. Geneva: International Labour Office,
2006.
Chaturvedi, Vinayak. Peasant Pasts History and Memory in Western India. Berkeley, USA:
University of California Press, 2007.
Ciulla, Joanne B. The Working Life: The Promise and Betrayal of Modern Work. New York: Random
House Times Books, 2000.
Clandinin, D. Jean and F. Michael Connelly. Narrative Inquiry: Experience and Story in Qualitative
Research. San Francisco: Jossey-Bass Publishers, 2000.
Clegg, Stewart R., David Courpasson and Nelson Phillips. Power and Organization. London: Sage,
2006.
Clegg, Stewart R. and James R. Bailey, eds., International Encyclopaedia of Organization Studies,
Vol. 1. Los Angeles: Sage Publications, 2008.
Cohen, Don and Laurence Prusak. In Good Company: How Social Capital Makes Organizations
Work. Boston: Harvard Business School Press, 2001.
Cole, Simon. Suspect Identities: A History of Fingerprinting and Criminal Identification.
Cambridge, MA, USA: Harvard University Press, 2001.
Connolly, Thomas and Carolyn Begg. Database Systems: A Practical Approach to Design,
Implementation, and Management, 4th ed. Harlow: Addison Wesley, 2005.
Crain, Marion, Winifred R. Poster and Miriam A. Cherry, eds. Invisible Labour: Hidden Work in the
Contemporary World. California: University of California, 2016.
Crane, Andrew and Dirk Matten. Business Ethics: Managing Corporate Citizenship and
Sustainability in the Age of Globalization, 2nd ed. Oxford: Oxford University Press, 2007.
D’Cruz, Premilla. Workplace Bullying in India. New Delhi: Routledge, 2012.
DeCenzo, David A. and Stephen P. Robbins. Fundamentals of Human Resource Management, 8th
ed. New Delhi, India: John Wiley, 2005.
Denning, Dorothy E. Information Warfare and Security. Boston, MA: Addison-Wesley, 1999.
Bibliography
xviii
Denzin, Norman K. and Yvonna S. Lincoln, eds. The SAGE Handbook of Qualitative Research, 4th
ed. Los Angeles: Sage, 2011.
Dirks, Nicholas B. The Scandal of Empire: India and the Creation of Imperial Britain. Harvard:
Harvard University Press, 2006.
Dorff, Elliot N. and Louis E. Newman. Jewish Choices, Jewish Voices: Body. Philadelphia: Jewish
Publication Society, 2008.
Drucker, Peter F. Landmark of Tomorrow: A Report on the New “Post Modern” World. New
Brunswick: Transaction Publishers, 2011.
_________. Peter Drucker on the Profession of Management. Harvard: Harvard Business School,
2003.
Drummond, John and Bill Bain, eds. Managing Business Ethics. Oxford: Butterworth-Heinemann,
1996.
DuBrin, Andrew J. Essentials of Management, 9th ed. Mason, OH: South-Western Cengage Learning,
2012.
Edwards, Rosalind and Janet Holland. What is Qualitative Interviewing? London: Bloomsbury,
2013.
Ehnert, Ina, Wes Harry, Klaus J. Zink, eds. Sustainability and Human Resource Management:
Developing Sustainable Business Organizations. Berlin: Springer, 2014.
Ehnert, Ina. Sustainable Human Resource Management: A Conceptual and Exploratory Analysis
from a Paradox Perspective. Berlin: Physica-Verlag, 2009.
Elmasri, Ramez and Shamkant B. Navathe. Fundamentals of Database Systems, 6th ed. Boston:
Addison-Wesley, 2011.
Emerson, Thomas I. The System of Freedom of Expression. New York: Vintage Books, 1970.
Epstein, Marc J. and Adriana R. Buhovac. Making Sustainability Work: Best Practices in Managing
and Measuring Corporate Social, Environmental, and Economic Impacts, 2 ed. San Francisco:
Berrett-Koehler Publishers, 2014.
Fayol, Henri. General and Industrial Management. Translated by Constance Storrs. Eastford, CT:
Martino Publishing, 2013.
Fernandes, Leela. India’s New Middle Class: Democratic Politics in an Era of Economic Reform.
Minneapolis, MN: University of Minnesota Press, 2006.
Fernando, A.C. Business Ethics and Corporate Governance. Delhi: Pearson, 2010.
Fernie, Sue and David H. Metcalf. (Not) Hanging on the Telephone: Payment Systems in the New
Sweatshops. London: Centre for Economic Performance, London School of Economics, 2000.
Bibliography
xix
Fisher, Colin and Alan Lovell. Business Ethics and Values: Individual, Corporate and International
Perspectives. England: Pearson Education, 2009.
Flaherty, David H. Protecting Privacy in Surveillance Societies: The Federal Republic of Germany,
Sweden, France, Canada, and the United States. Chapel Hill: The University of North Carolina
Press, 1989.
Flynn, Nancy. The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company’s
E-Mail, Blogs, Social Networking, and Other Electronic Communication Tools, 2nd ed. New
York: American Management Association, 2009.
Forester, Tom and Perry Morrison. Computer Ethics – Cautionary Tales and Ethical Dilemmas in
Computing, 2nd ed. Cambridge: The MIT Press, 1994.
Foucault, Michel. Discipline and Punish: The Birth of the Prison. Translated by Alan Sheridan. New
York: Penguin Books, 1991.
_________. Discipline and Punish: The Birth of the Prison. New York: Vintage Books, 1997.
_________. Power/Knowledge: Selected Interviews and Other Writings, 1972-1977. Translated by
Colin Gordon et al. New York: Pantheon, 1980.
Francis, Ronald D. and Mukti Mishra. Business Ethics: An Indian Perspective. New Delhi: Tata
McGraw Hill, 2011.
Fraser, Jill Andreskey. White-Collar Sweatshop: The Deterioration of Work and Its Rewards in
Corporate America. New York: W. W. Norton & Company, Inc., 2001.
Fried, Charles. An Anatomy of Values: Problems of Personal and Social Choice. Cambridge: Harvard
University Press, 1970.
Fromm, Erich. Escape from Freedom. New York: Avon Books, 1969.
Fukuyama, Francis. Trust. New York: Free Press, 1995.
Furedi, Frank. Culture of Fear: Risk-Taking and the Morality of Low Expectation. London:
Continuum, 2002.
Gandy, Oscar. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO:
Westview Press, 1993.
Gauthier, David. Morals by Agreement. Oxford: Clarendon Press, 1986.
Giddens, Anthony. Social Theory and Modern Sociology. Cambridge: Polity Press, 2007 (first
published in 1987).
Gilligan, Carol. In a Different Voice: Psychological Theory and Women’s Development. Cambridge:
Harvard University Press, 1982.
Bibliography
xx
Girot, Clarisse, ed. Regulation of Cross-Border Transfers of Personal Data in Asia. Singapore: Asian
Business Law Institute, 2018.
Gomez-Mejia, L. R., Balkin, D. B., and Cardy, R. L. Managing Human Resources, 4th ed. Harlow,
UK: Pearson Education, 2004.
Gottschalk, Petter. Knowledge Management Systems in Law Enforcement: Technologies and
Techniques. Hershey: Idea Group Publishing, 2007.
Griffin, Ricky and Gregory Moorhead. Organizational Behaviour: Managing People and
Organizations, 7th ed. South-Western, Mason, OH: Cengage Learning, 2014.
Gueras, Dean and Charles Varofalo. Practical Ethics in Public Administration, 3rd ed. Vienna, VA:
Management Concepts Inc., 2010.
Guerin, Lisa. Smart Policies for Workplace Technologies: Email, Social Media, Cell Phones &
More, 5th ed. Berkeley, CA: Nolo, 2017.
Haraway, Donna. Simians, Cyborgs and Women: The Reinvention of Nature. New York: Routledge,
1991.
Harrell, Margaret C. and Melissa A. Bradley. Data Collection Methods: Semi-Structured Interviews
and Focus Groups. Santa Monica, CA: Rand Corporation, 2009.
Hartman, Edwin. Organizational Ethics and the Good Life. Oxford: Oxford University Press, 1996.
Haviland, William A., Harald E.L. Prins, Dana Walrath and Bunny McBride. The Essence of
Anthropology, 3rd ed. Belmont, CA: Wadsworth, 2013.
Hessen, Robert. In Defence of the Corporation. Stanford, CA: Hoover Institution, 1979.
Hickman, Larry. Philosophical Tools for Technological Culture: Putting Pragmatism to Work.
Bloomington: Indiana University Press, 2001.
Hofstede, Geert. Culture’s Consequence: International Differences in Work-Related Values, vol. 5.
Newbury Park: Sage, 1980.
Hon, Linda Chilers and James E. Grunig. Guidelines for Measuring Relationships in Public
Relations. Gainesville, FL: Institute for Public Relations, 1999.
Immy, Holloway and Kathleen Galvin. Qualitative Research in Nursing and Healthcare, 4th ed. West
Sussex, UK: Wiley, 2017.
Innes, Julie. Privacy, Intimacy, and Isolation. Oxford: Oxford University Press, 1992.
Institute for Human Development and Academic Foundation. India Labour and Employment Report
2014: Workers in the Era of Globalization. New Delhi: AF and IHD, 2014.
Bibliography
xxi
Jarrett, H. Marshall and Michael W. Bailie. Prosecuting Computer Crimes: Computer Crime and
Intellectual Property Section Criminal Division, 2nr ed. Washington: Office of Legal
Education Executive Office for United States Attorneys, 2010.
Johnson, Deborah. Computer Ethics. New Jersey: Prentice-Hall, 2001.
Joshi, Sanjay. Fracture Modernity: Making of a Middle Class in Colonial North India. New Delhi:
Oxford University Press, 2001.
Kakar, Sudhir and Katharina Kakar. The Indians: Portrait of a People. New Delhi: Penguin, 2007.
Kalleberg, Arne L. Good Jobs, Bad Jobs: The Rise of Polarized and Precarious Employment Systems
in the United States, 1970s-2000s. New York: Russell Sage Foundation, 2011.
Kanagasabapathi, P. Indian Models of Economy, Business and Management, 2nd ed. New Delhi: PHI
Learning, 2009.
Kant, Immanuel. Groundwork of the Metaphysics of Morals. Edited and translated by Allen W.
Wood. New Haven: Yale University Press, 2002.
Kapila, Uma, ed. Indian Economy since Independence, 14th ed. New Delhi: Academic Foundation,
2002-03.
Karade, Jagan. Development of Scheduled Castes and Scheduled Tribes in India. Newcastle, UK:
Cambridge Scholars, 2014.
Kaura, Amit. Evidence-Based Medicine: Reading and Writing Medical Papers. Edinburgh: Mosby
Elsevier, 2013.
Kohlberg, Lawrence. The Meaning and Measurement of Moral Development. Massachusetts: Clark
University Press, 1981.
Kruegle, Herman. CCTV Surveillance: Video Practices and Technology, 2nd ed. Burlington, MA:
Elsevier, 2007.
Lane III, Frederick S. The Naked Employee: How Technology is Compromising Workplace Privacy.
New York: Amacom, 2003.
Levinas, Emmanuel. Otherwise than Being or Beyond Essence. Translated by A. Lingis. Dordrecht:
Kluwer Academic Publishers, 1991 (1974).
_________. Outside the Subject. Translated by M.B. Smith. London: The Athlone Press, 1993.
Lind, Edgar Allan and Tom R. Tyler. The Social Psychology of Procedural Justice. New York:
Springer Science and Business Media, 1988.
Lyon, David. The Culture of Surveillance: Watching as a Way of Life. Cambridge: Polity Press, 2018.
_________. Surveillance after Snowden. Malden, MA: Polity, 2015.
Bibliography
xxii
_________. Surveillance Studies: An Overview. Cambridge: Polity Press, 2007.
Lyon, David. Surveillance after September 11. Cambridge: Polity Press, 2003.
_________. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. London:
Routledge, 2003.
_________. Surveillance Society: Monitoring Everyday life. Buckingham: McGraw-Hill Education,
2001.
_________. The Electronic Eye: The Rise of Surveillance Society. Cambridge: Polity,1994.
Machado, Carolina and J. Paulo Davim. Management for Sustainable Development. Alborg: River
Publishers, 2016.
MacIntyre, Alasdair. After Virtue: A Study in Moral Theory, 3rd ed. Notre Dame: University of Notre
Dame Press, 2007.
Mack, Natasha, Cynthia Woodsong, Kathleen M. Macqueen, Greg Guest and Emily Namey.
Qualitative Research Methods: A Data Collector’s Field Guide. North Carolina: Family Health
International, 2005.
Majumdar, Sumit Kumar. India’s Late, Late Industrial Revolution. Cambridge: Cambridge
University Press, 2012.
Maritain, Jacques. True Humanism. New York: Charles Scribner’s Sons, 1938.
Marx, Gary T. Undercover: Police Surveillance in America. Berkeley: University of California
Press, 1988.
Mayo, Elton. The Human Problems of an Industrial Civilization. Salem, NH: Macmillan, 1933.
McClean, David E. Wall Street, Reforming the Unreformable: An Ethical Perspective. Oxon:
Routledge, 2016.
McClelland, David C. The Achieving Society. New York: Free Press, (originally in 1961) 2010.
McCue, Colleen. Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis,
2nd ed. Oxford: Elsevier, 2015.
McMahon, Christopher. Authority and Democracy. Princeton: Princeton University Press, 1995.
McPhail, Brenda. What is ‘On the Line’ in Call Centre Studies? A Review of Key Issues in the
Academic Literature. Toronto: Faculty of Information Studies, University of Toronto, 2001.
McShane, Steven L. and Mary Ann von Glinow. Organizational Behaviour: Emerging Realities for
the Workplace Revolution, 4th ed. New York: McGraw-Hill, 2008.
Melé, Domènec. Business Ethics in Action: Seeking Human Excellence in Organizations. New York:
Palgrave Macmillan, 2009.
Bibliography
xxiii
_________. Management Ethics: Placing Ethics at the Core of Good Management. New York:
Palgrave MacMillan, 2012.
Merleau-Ponty, Maurice. The Visible and the Invisible, ed. Claude Lefort. Translated by Alphonso
Lingis. Evanston, IL: Northwestern University Press, 1968.
Messner, Johannes. Social Ethics: Natural Law in the Modern World. Translated by J.J. Doherty.
USA: Herder, St. Louis, 1965.
Mill, John Stuart. Utilitarianism. Montana: Kessinger, 2004.
Miller, Arthur R. The Assault on Privacy. Michigan: The University of Michigan Press, 1971.
Mohamed, Malik. The Foundations of the Composite Culture in India. Delhi: Aakar Books, 2007.
Moore, Adam D. Privacy Rights: Moral and Legal Foundations. Pennsylvania: The Pennsylvania
State University Press, 2010.
Morewitz, Stephen J. Death Threats and Violence: New Research and Clinical Perspectives. San
Francisco: Springer, 2008.
Mosco, Vincent. To the cloud: Big Data in a Turbulent World. New York, NY: Paradigm, 2014.
Mounier, Emmanuel. A Personalist Manifesto. Translated by the Monks of Saint John’s Abbey at
Collegeville, Minn. London: Longmans, Green and Company, 1938.
Mruthyunjaya, H.C. Business Ethics and Value Systems. Delhi: PHI Learning, 2013.
NASSCOM (National Association of Software and Service Companies). HR Handbook: Invited
Articles, HR Summit 2006. New Delhi: NASSCOM, 2006.
Newton, Lisa. Business Ethics in the Social Context: Law Profits and the Evolving Moral Practices
of Business. New York: Springer, 2014.
Noronha, Ernesto and Premilla D’Cruz. Employee Identity in Indian Call Centres: The Notion of
Professionalism. New Delhi: Response Books, 2009.
Norris, Clive. and Gary Armstrong. The Maximum Surveillance Society: The Rise of CCTV. Oxford:
Berg, 1999b.
_________. The Unforgiving Eye: CCTV Surveillance in Public Space. Mimeo. Hull, UK: Centre
for Criminology and Criminal Justice, University of Hull, 1997.
Nussbaum, Martha C. Creating Capabilities: The Human Development Approach. Cambridge: The
Belknap Press of Harvard University Press, 2011.
_________. Frontiers of Justice: Disability, Nationality, Species Membership. Cambridge, MA:
Belknap Press of Harvard University Press, 2006.
Bibliography
xxiv
O’Dougherty, Maureen. Consumption Intensified: The Politics of Middle-Class Daily Life in Brazil.
Durham, NC: Duke University Press, 2003.
O’Toole, James and Edward E. Lawler III. The New American Workplace. New York: Palgrave,
2006.
Overell, Stephen. The Meaning of Work. Bristol: Futurelab, 2009.
Painter-Morland, Mollie. Business Ethics as Practice: Ethics as the Everyday Business of Business.
Cambridge: Cambridge University press, 2011.
Paludi, Michele Antoinette, Rudy V. Nydegger and Carmen A. Paludi. Understanding Workplace
Violence: A Guide for Managers and Employees. Westport: Praeger, 2006.
Pandya, Bhavesh. Safa Hamdare and Asim Kumar Sen. Database Management System. Noida, New
Delhi: Vikas, 2015.
Perri 6, and Ben Jupp. Divided by Information? The ‘Digital Divide’ that Really Matters and the
Implications of the New Meritocracy. London: Demos, 2001.
Petronio, Sandra. Boundaries of Privacy: Dialectics of Disclosure. Albany, NY, US: State University
of New York Press, 2002.
Posner, Richard. The Economics of Justice. Cambridge: Harvard University Press1981.
Quinn, Michael J. Ethics for the Information Age, 5th ed. Boston, MA: Pearson, 2012.
_________. Ethics for the Information Age. Boston: Pearson-Addison-Wesley, 2005.
Raghavan, Vaithianthan and V.S. Murali. General Economics for the CA Common Proficiency Test,
2nd ed. Chandigarh: Pearson, 2015.
_________. General Economics for the CA Common Proficiency Test. Chandigarh: Pearson, 2011.
Raghavan, Ram. Human Capital Management Challenges in India. Oxford: Chandos Publishing,
2011.
Ramakrishnan, Raghu and Johannes Gehrke. Database Management Systems Solutions Manual, 3rd
ed. New York: McGraw-Hill, 2003.
Rawat, Ramnarayan. Reconsidering Untouchability: Chamars and Dalit History in North India.
Bloomington: Indiana University Press, 2011.
Rawls, John. A Theory of Justice. Cambridge, MA: Harvard University Press, 1971.
_________. A Theory of Justice. Cambridge, MA: Harvard University Press, 1999 (Rev. ed).
Regan, Priscilla M. Legalizing Privacy: Technology, Social Values, and Public Policy. London:
University of North Carolina Press, 1995.
Bibliography
xxv
Reynolds, George. Ethics in Information Technology, 2nd ed. Boston, MA: Thomson Course
Technology, 2007.
Riessman, Catherine Kohler. Narrative Analysis. Newbury Park: Sage Publications, 1993.
Robbins, Stephen P., Rolf Bergman, Ian Stagg and Mary Coulter. Management, 7th ed. Melbourne:
Pearson, 2015.
Robbins, Stephen, Timothy A. Judge, Bruce Millett and Maree Boyle. Organizational Behaviour, 7th
ed. Frenchs Forest NSW: Pearson, 2014.
Rosen, Jeffrey. The Unwanted Gaze: The Destruction of Privacy in America. New York: Vintage
Books, 2000.
Rubin, Herbert J. and Irene S. Rubin. Qualitative Interviewing, 2nd ed. The Art of Hearing Data, 2nd
ed. Thousand Oaks, CA: SAGE Publications, Inc., 2005.
Safire, William. Safire’s New Political Dictionary: The Definitive Guide to the New Language of
Politics. New York: Random House, 1993.
Saigal, Krishan. Vedic Management: The Dharmic and Yogic Way. Delhi: Gyan Publishing House,
2000.
Sanderson, Helen and Jaimee Lewis. A Practical Guide to Delivering Personalisation; Person-
Centred Practice in Health and Social Care. London: Jessica Kingsley Publishers, 2012.
Saval, Nikil. Cubed: A Secret History of the Workplace. New York: Doubleday, 2014.
Schacht, Richard. The Future of Alienation. Urbana and Chicago: University of Illinois Press, 1994.
Schermerhorn, J. R., Jr. Introduction to management, 11th ed. Hoboken, NJ: John Wiley. 2011.
Schiller, Jochen and Agnes Voisard, eds. Location-Based Services. San Francisco, CA: Morgan
Kaufmann Publishers, 2004.
Schoeman, Ferdinand, ed. Philosophical Dimensions of Privacy: An Anthology. Cambridge:
Cambridge University Press, 1984.
Schumacher, E.F. Small is Beautiful: Economics as if People Mattered. New York: Harper & Row,
1973.
Schwarz, Henry. Constructing the Criminal Tribe in Colonial India: Acting Like a Thief. USA:
Wiley-Blackwell, 2010.
Sen, Amartya. Development as Freedom. Oxford: Oxford University Press, 1999.
_________. The Idea of Justice. London: Penguin Books, 2009.
Sevenhuijsen, Selma. Citizenship and the Ethics of Care: Feminist Considerations on Justice,
Morality and Politics. New York: Routledge, 1998.
Bibliography
xxvi
Severson, Richard J. The Principles of Information Ethics. Abington, OX: Routledge, 1997.
Shah, Shashank and V. E. Ramamoorthy. Soulful Corporations: A Value-Based Perspective on
Corporate Social Responsibility. New Delhi: Springer, 2014.
Sharma, S.K. Privacy Law: A Comparative Study. New Delhi: Atlantic Publishers, 1994.
Shields, Patricia M. and Nandhini Rangarajan. A Playbook for Research Methods: Integrating
Conceptual Frameworks and Project Management. Stillwater, OK: New Forums Press, 2013.
Simon, Herbert A. Administrative Behaviour: A Study of Decision-Making Process in Administrative
Organization. New York: Free Press, 1976.
Sims, Ronald R. Managing Organizational Behaviour. Westport, London: Quorum Books, 2002.
Singh, Birinder P. Criminal Tribes of Punjab: A Social-Anthropological Inquiry. New York:
Routledge, 2010.
Singh, Kavita. Organizational Behaviour: Text and Cases, 3rd ed. Noida, New Delhi: Vikas
Publishing House, 2015.
Singh, Ramesh. Indian Economy: For Civil Services Examinations, 7th ed. New Delhi: McGraw Hill
Education, 2015.
Sinha, Jai B.P. Culture and Organizational Behaviour. New Delhi: Sage Publications, 2008.
Smith, Graham T. Machine Tool Metrology: An Industrial Handbook. Switzerland: Springer, 2016.
Snyder, Mark. Public Appearances, Private Realities: The Psychology of Self-Monitoring. New
York: W H Freeman/Times Books/ Hemy Holt & Co, 1987.
Solomon, Robert C. A Better Way to Think About Business: How Personal Integrity Leads to
Corporate Success. New York: Oxford University Press, 1999.
Solomon, Robert C. Above the Bottom Line: An Introduction to Business Ethics, 2nd ed. Fort Worth:
Harcourt Brace College Publishers, 1994.
Solomon, Robert C. Ethics and Excellence: Cooperation and Integrity in Business. New York:
Oxford University Press, 1992.
Solove, Daniel J. and Paul M. Schwartz. Privacy Law Fundamentals. Portsmouth, NH: IAPP, 2017.
_________. Understanding Privacy. Cambridge: Harvard University Press, 2009.
Spaemann, Robert. Happiness and Benevolence. Translated by Jereiah Alberg. Notre Dame: Notre
Dame University Press, 2000.
_________. Persons: The Difference between ‘Someone’ and ‘Something.’ Translated by Oliver
O’Donovan. Oxford: Oxford University Press, 2006.
Bibliography
xxvii
Spinello, Richard A. Case Studies in Information and Computer Ethics. Upper Saddle River, NJ:
Prentice Hall, 1997.
Spinosa, Charles Fernando Flores and Hubert Dreyfus. Disclosing New Worlds: Entrepreneurship,
Democratic Action, and the Cultivation of Solidarity. Cambridge, MA and London: MIT Press,
1997.
Staples, William G. The culture of surveillance: Discipline and Social Control in the United States.
New York: St. Martin’s Press, 1997.
Stein, Edith. La estructura de la persona humana (first published in German as ‘Der aufbau der
menschlichenperson’, 1994). Madrid: BAC, 1998.
Stoddart, Eric. Theological Perspectives on a Surveillance Society: Watching and Being Watched.
Farnham, England: Ashgate, 2011.
Sullivan, Jeremiah J. Exploring International Business Environments. Needham Heights, NJ:
Pearson Custom Publishing, 1999.
Sullivan, Roger J. Immanuel Kant’s Moral Theory. Cambridge: Cambridge University Press,
(originally in 1989) 1995.
Szabados, Bela and Eldon Soifer. Hypocrisy: Ethical Investigations. Canada: Broadview Press, 2004.
Taylor, Frederick Winslow. The Principles of Scientific Management. London: Forgotten Books,
2015.
Teltumbde, Anand. The Persistence of Caste: The Khairlanji Murders and India’s Hidden Apartheid.
London: Zed Books, 2010.
Terkel, Studs. Working: People Talk About What They Do All Day and How They Feel About What
They Do. New York: Free Press, 1974.
Thompson, Paul and Chris Warhurst. eds. Workplaces of the Future. London: Macmillan, 1998.
Tuan, Yi-Fu. Space and Place: The Perspective of Experience. Minneapolis: University of Minnesota
press, 2001.
Tyler, Tom R. Why People Obey the Law: Procedural Justice, Legitimacy, and Compliance.
Princeton, NJ: Princeton University Press, 2006.
Tyler, Tom R. and Steven L. Blader. Cooperation in Groups: Procedural Justice, Social Identity,
and Behavioural Engagement. Philadelphia, PA: Psychology Press, 2000.
Tylor, Edward Burnett. Primitive Culture: Researches into the Development of Mythology,
Philosophy, Religion, Art, and Custom, originally in 1871. New York: Gordon Press, 1974.
Udupa, Sahana. Making News in Global India: Media, Publics, Politics. Cambridge: Cambridge
University Press, 2015.
Bibliography
xxviii
Van Blarkom, G.W, J.J. Borking and J.G.E. Olk. Handbook of Privacy and Privacy-Enhancing
Technologies. The Hague: College Beschermign Persoonsgegevens, TNO-FEL, 2003.
Weber, Max. The Theory of Social and Economic Organization. Translated by A.M. Henderson and
Talcott Parsons. London: Collier Macmillan Publishers, [originally in 1921] 1947.
Weckert, John. Electronic Monitoring in the Workplace: Controversies and Solutions. Hershey: Idea
Group Publishing, 2005.
Werhane, Patricia H., Tara J. Radin and Norman E. Bowie. Employment and Employee Rights.
Malden, MA: Blackwell Publishing, 2004.
Werhane, Patricia. Persons, Rights, and Corporations. Englewood Cliffs, N.J.: Prentice- Hall, 1985.
Westin, Alan F. Privacy and Freedom. New York: Atheneum, 1967.
Wilson, Clive. Designing the Purposeful Organization: How to Inspire Business Performance
Beyond Boundaries. London: Kogan page Limited, 2015.
Wojtyla, Karol. Love and Responsibility (first published in Polish, Miłość i odpowiedzialność.
Studium etyczne. Lublin: KUL, 1960). San Francisco: Harper-Collins, 1981.
_________. Person and Community. Selected Essays. Translated by O. Theresa Sandok. New York:
Peter Lang, 1993.
Wynne, R., N. Clarkin, T. Cox and A. Griffiths. Guidance on the Prevention of Violence at Work.
Brussels: European Commission, DG-V, Ref.CE/V1-4/97, 1997.
Young, Iris Marion. Justice and the Politics of Difference. Woodstock: Princeton University Press,
(1990) 2011.
Young, Jock. The Exclusive Society. London: Sage, 1999.
Zuboff, S. In the Age of the Smart Machine: The Future of Work and Power. New York: Basic,1988.
B. Journal Articles
Acevedo, Alma. “Personalist Business Ethics and Humanistic Management: Insights from Jacques
Maritain.” Journal of Business Ethics 105, no. 2 (2012): 197-219.
Adams III, Hall, Suzanne M. Scheuing and Stacey A. Feeley. “E-mail Monitoring in the Workplace:
The Good, the Bad and the Ugly.” Defense Counsel Journal 67, no. 1 (2000): 32-46.
Adler, Paul S. and Seok-Woo Kwon. “Social Capital: Prospects for a New Concept.” Academy of
Management Review 27, no. 1 (2002): 17-40.
Agarwal, Anjaly. “Data Protection and Privacy Laws.” The International Journal of Science &
Technology 2, no. 2 (2014): 15-25.
Bibliography
xxix
Aiello, John R. “Computer-Based Work Monitoring: Electronic Surveillance and its Effects.”
Journal of Applied Social Psychology 23 (1993): 499-507.
Aiello, John R. and Carol M. Svec. “Computer Monitoring of Work Performance: Extending the
Social Facilitation Framework to Electronic Presence.” Journal of Applied Social Psychology
23, no. 7 (1993): 537-548.
Aiello, John R. and Kathryn J. Kolb. “Electronic Performance Monitoring and Social Context:
Impact on Productivity and Stress.” Journal of Applied Psychology 80, no. 3 (1995): 339-353.
Ajunwa, Ifeoma, Kate Crawford, and Jason Schultz. “Limitless Worker Surveillance.” California
Law Review 105 (2017): 735-776.
Akerlind, Gerlese S. “Variation and Commonality in Phenomenographic Research Methods.” Higher
Education Research & Development 31, no. 1 (2012): 115-127.
_________. “Variation and Commonality in Phenomenographic Research Methods.” Higher
Education Research & Development 24, no. 4 (2005): 321-334.
Alder, G. Stoney and Phillip K. Tompkins. “Electronic Performance Monitoring: An Organizational
Justice and Concretive Control Perspective.” Management Communication Quarterly 10, no.
3 (1997): 259-288.
Alder, G. Stoney. “Employee Reactions to Electronic Performance Monitoring: A Consequence of
Organizational Culture.” Journal of High Technology Management Research 12 (2001): 323-
342.
_________. “Ethical Issues in Electronic Performance Monitoring: A Consideration of
Deontological and Teleological Perspectives.” Journal of Business Ethics 17, no. 7 (1998):
729-743.
Alder, G. Stoney, Marshall Schminke, Terry W. Noel and Maribeth Kuenzi. “Employee Reactions
to Internet Monitoring: The Moderating Role of Ethical Orientation.” Journal of Business
Ethics 80, no. 3 (2008): 481-498.
Alge, Bradley J, Cary A. Ballinger and Stephen G. Green. “Remote Control: Predictors of Electronic
Monitoring Intensity and Secrecy.” Personnel Psychology 57, no.2 (2004): 377-410.
_________. “Effects of Computer Surveillance on Perceptions of Privacy and Procedural Justice.”
Journal of Applied Psychology 86, no. 4 (2001): 797-804.
Alge, Bradley J. and S. Duane Hansen. “Workplace Monitoring and Surveillance Research Since
1984: A Review and Agenda.” The Psychology of Workplace Technology (2014): 209-237.
Ali, Abbas J. “Scaling an Islamic Work Ethic.” The Journal of Social Psychology 128, no. 5 (1988):
575-583.
Ali, Abbas J. and Abdullah Owaihan. “Islamic Work Ethic: A Critical Review.” Cross Cultural
Management: An International Journal 15, no. 1 (2008): 5-19.
Bibliography
xxx
Allen, Myria Watkins, Stephanie J. Coopman, Joy L. Hart and Kasey L. Walker. “Workplace
Surveillance and Managing Privacy Boundaries.” Management Communication Quarterly 21,
no. 2 (2007): 172-200.
Allmer, Thomas. “A Critical Contribution to Theoretical Foundations of Privacy Studies.” Journal
of Information, Communication and Ethics in Society 9, no. 2 (2011): 83-101.
Al-Rjoub, Hamed, Arwa Zabian and Sami Qawasmeh. “Electronic Monitoring: The Employees Point
of view.” Journal of Social Sciences 4, no. 3 (2008): 189-195.
Ambrose, Maureen L. and G. Stoney Alder. “Designing, Implementing, and Utilizing Computerized
Performance Monitoring: Enhancing Organizational Justice.” Research in Personnel and
Human Resources Management 18 (2000): 187-219.
Amick, Benjamin C. III and Michael J. Smith. “Stress, Computer-Based Work Monitoring and
Measurement Systems: A Conceptual Overview.” Applied Ergonomics 23, no. 1 (1992): 6-16.
Andrejevic, Mark. “Surveillance in the Digital Enclosure.” The Communication Review 10, no.4
(2007): 295-317.
Andrews, Kenneth R. “Ethics in Practice.” Harvard Business Review 67 (1989): 99-104.
Annapoorna, S. and Siddappa T. Bagalkoti. “Development of IT Sector in India: Analysis of Reasons
and Challenges.” Journal of Economics and Sustainable Development 2, no. 2 (2011): 28-37.
Aquino, Karl. “Structural and Individual Determinants of Workplace Victimization: The Effects of
Hierarchical Status and Conflict Management Style.” Journal of Management 26, no. 2 (2000):
171-193.
Ardichvili, Alexandre, Douglas Jondle, Brenda Kowske, Edgard Cornachione, Jessica Li, and
Thomas Thakadipuram. “Ethical Cultures in Large Business Organizations in Brazil, Russia,
India, and China.” Journal of Business Ethics 105, no. 4 (2012): 415-428.
Ariss, Sonny S. “Computer Monitoring: Benefits and Pitfalls Facing Management.” Information &
Management 39 (2002): 553-558.
Arnaud, Stéphanie and Jean-Louis Chandon. “Will Monitoring Systems Kill Intrinsic Motivation?
An Empirical Study.” Revue de gestion des Ressources Humaines 90, no. 4 (2013): 35-53.
Aronsson, Gunnar and Klas Gustafsson. “Sickness Presenteeism: Prevalence, Attendance-Pressure
Factors, and an Outline of a Model for Research.” Journal of Occupational and
Environmental Medicine, 47, no. 9 (2005): 958-966.
Azzam, Salem (Secretary General). “Universal Islamic Declaration of Human Rights.” Human
Rights 2, no. 3 (2007):102-112.
Bagnara, Sebastiano and Patrizia Marti. “Human Work in Call Centres: A Challenge for Cognitive
Ergonomics.” Theoretical Issues in Ergonomics Science 2, no. 3 (2001): 223-237.
Bibliography
xxxi
Bailey, Jane and Ian Kerr. “Seizing Control: The Experience Capture Experiments of Ringley and
Mann.” Ethics and Information Technology 9, no. 2 (2007): 129-139.
Bain, Peter and Phil Taylor. “Entrapped by the ‘Electronic Panopticon’? Worker Resistance in the
Call Centre.” New Technology, Work, and Employment 15, no. 1 (2000): 2-18.
Bain, Peter, A. Watson, G. Mulvey, P. Taylor and G. Gall. “Taylorism, Targets and the Pursuit of
Quantity and Quality by Call Centre Management.” New Technology, Work and Employment
17, no. 3 (2002): 170-185.
Bain, Read. “Technology and State Government.” American Sociological Review 2, no. 6 (1937):
860.
Ball, Kirstie S. “Situating Workplace Surveillance: Ethics and Computer Based Performance
Monitoring.” Ethics and Information Technology 3 (2001): 211-223.
_________. “Organization, Surveillance and the Body: Towards a Politics of Resistance.”
Organization 12, no. 1 (2005): 89-108.
_________. “Workplace Surveillance: An overview.” Labour History 51, no. 1 (2010): 87-106.
Ball, Kirstie S. and Stephen T. Margulis. “Electronic Monitoring and Surveillance in Call Centres:
A Framework of Investigation.” New Technology, Work, and Employment 26, no. 2 (2011):
113-126.
Ball, Kirstie, MariaLaura Di Domenico, and Daniel Nunan. “Big Data Surveillance and the Body-
Subject.” Body & Society 22, no. 2 (2016): 58-81.
Bandura, Albert. “Social Cognitive Theory of Self-Regulation.” Organizational Behaviour and
Human Decision Process 50 (1991): 248-287.
Barling, Julian, Kathryne Dupr´e and E. Kevin Kelloway. “Predicting Workplace Aggression and
Violence.” Annual Review of Psychology, 60, (2009). 671-692.
Barnard, Alan, Heather McCosker and Rod Gerber. “Phenomenography: A Qualitative Research
Approach for Exploring Understanding in Health Care.” Qualitative Health Research 9, no. 2
(1999): 212-226.
Barnes, Alison. “Diaries, Dunnies and Discipline: Resistance and Accommodations to Monitoring
in Call Centres.” Labour and Industry 14, no. 3 (2004): 127-137.
Barnes, Thomas. “The IT Industry and Economic Development in India: A Critical Study.” Journal
of South Asian Development 8, no. 1 (2013): 61-83.
Bart Simon. “The Return of Panopticism: Supervision, Subjection and the New Surveillance.”
Surveillance & Society 3, no. 1 (2005): 1-20.
Barth, Adam. “Privacy and Contextual Integrity: Framework and Applications.” IEEE Symposium
on Security and Privacy (2006): 184-198.
Bibliography
xxxii
Basriya, S. Rabiyathul. “Employee Absenteeism in Indian Industries.” International Journal of
Science and Research 4, no. 10 (2015): 141-156.
Basu, Prahlad K. “Demystifying Privatization in Developing Countries.” International Journal of
Public Sector Management 7, no. 3 (1994): 44-55.
Batt, Rosemary, Alex Colvin, and Jeffrey Keefe. “Employee Voice, Human Resource Practices and
Quit Rates: Evidence from the Telecommunications Industry.” Industrial and Labour
Relations Review 55, no. 4 (2002.): 573-93.
Batt, Rosemary, Virginia Doellgast, Hyunji Kwon and Vivek Agarwal. “Service Management and
Employment Systems in U.S. and Indian Call Centres.” Brookings Trade Forum, Offshoring
White-Collar Work (2005): 335-372.
Bauman, Zygmunt, Didier Bigo, Paulo Esteves, Elspeth Guild, Vivienne Jabri, David Lyon and R.
B. J. Walker. “After Snowden: Rethinking the Impact of Surveillance.” International Political
Sociology 8 (2014): 121-144.
Baumeister, Roy F., Kathaleen D. Vohs and Dianne M. Tice. “The Strength Model of Self-Control.”
Current Directions in Psychological Science 16, no. 6 (2007): 351-355.
Beblavy, Miroslav, Ilaria Maselli, and Elisa Martellucci. “Workplace Innovation and Technological
Change.” Center for European Policy Studies, 2012, 34.
Bekkers, Victor, Arthur Edwards and Dennis de Kool. “Social Media Monitoring: Responsive
Governance in the Shadow of Surveillance?” Government Information Quarterly 30, no. 4
(2013): 335-342.
Bélanger, France and Robrt E. Crossler. “Privacy in the Digital Age: A Review of Information
Privacy Research in Information Systems.” MIS Quarterly 35, no. 4 (2011): 1017-1041.
Bennett, Colin J. “In Defence of Privacy: The Concept and the Regime.” Surveillance & Society 8,
no. 4 (2011): 485- 496.
Bental, Benjamin, Bruno Deffains, Dominique Demougin. “Credibility and Monitoring: Outsourcing
as a Commitment Device.” Journal of Economics & Management Strategy 21, no. 1 (2012):
31-52.
Berger, Ron and Ram Herstein. “The Evolution of Business Ethics in India.” International Journal
of Social Economics 41, no. 11 (2014): 1073-1086.
Berggren, Erik and Rob Bernshteyn. “Organizational Transparency Drives Company Performance.”
Journal of Management Development 26, no. 5 (2007): 411-417.
Bernardini, Paola. “Human Dignity and Human Capabilities in Martha C. Nussbaum.” Iustum
Aequum Salutare 4 (2010): 45-51.
Beu, D. and M.R. Buckley. “The Hypothesized Relationship between Accountability and Ethical
Behaviour.” Journal of Business Ethics 34 (2001): 57-73.
Bibliography
xxxiii
Bevir, Mark. “Foucault, Power and Institutions.” Political Studies XLVII (1999): 345-359.
Bevitt, Ann, Marian Waldmann, Teresa Basile, Peter Edlind and Gordon Milner. “Monitoring
Employees: Striking a Balance.” Labour and Employee Benefits 1 (2007/08): 53-59.
Bhatnagar, Jyotsna. “Talent Management Strategy of Employee Engagement in Indian ITES
Employees: Key to Retention.” Employee Relations 29, no. 6 (2007): 640-663.
Bhattacharjee, Anindo. “Modern Management through Ancient Indian Wisdom: Towards a More
Sustainable Paradigm.” School of Management Science-Purusartha 4, no. 1 (2011): 14-17.
Bhattacharyya, Ritu. “Skill Development Among Women – Awareness and Need – Study on Nation
Skill Development Mission.” GE-International Journal of Management Research 5, no. 1
(2017): 337-352.
Bhave, Devasheesh P. “The Invisible Eye? Electronic Performance Monitoring and Employee Job
Performance.” Personnel Psychology 67, no. 3 (2014): 605-635.
Bijlert, Victor van. “Hinduism, Values and Management.” Research & Reports, IIAS News Letter 33
(March 2004): 23.
Bjarnason, Dana. “Concept Analysis of Religiosity.” Home Health Care Management and Practice
19, no. 5 (2007): 350-355.
Blodgett, Jeffrey G., Donna J. Hill and Stephen S. Tax. “The Effects of Distributive, Procedural, and
Interactional Justice on Postcomplaint Behaviour.” Journal of Retailing 73, no. 2 (1996): 185-
210.
Bloom, Elise M., Madeleine Schachter and Elliot H. Steelman. “Competing Interests in the Post 9-
11 Workplace: The New Line Between Privacy and Safety.” William Mitchell Law Review 29,
3 (2003): 897-920.
Bockerman, Petri and Erkki Lakkenen. “What Makes You Work while You are Sick? Evidence from
a Survey of Workers.” European Journal of Public Health 20, no. 1 (2010): 43-46.
Bolino, Mark C. “Citizenship and Impression Management: Good Soldiers or Good Actors?” The
Academy of Management Review 24, no. 1 (1999): 82-98.
Bolino, Mark C., Jaron Harvey and Daniel G. Bachrach. “A Self-Regulation Approach to
Understanding Citizenship Behaviour in Organizations.” Organizational Behaviour and
Human Decision Process 119 (2012): 126-139.
Bolino, Mark C., William H. Turnley and James M. Bloodgood. “Citizen Behaviour and the Creation
of Social Capital in Organizations.” Academy of Management Review 27, no. 4 (2002): 505-
522.
Bolino, Mark C., William H. Turnley and Todd Averett. “Going the Extra Mile: Cultivating and
Managing Employee Citizenship Behaviour.” The Academy of Management Executive 17, no.
3 (2003):60-73.
Bibliography
xxxiv
Boneh, Dan, Joan Feigenbaum, Avi Silberschatz and Rebecca N. Wright. “PORTIA: Privacy,
Obligations, and Rights in Technologies of Information Assessment.” Bulletin of the IEEE
Computer Society Technical Committee on Data Engineering 27, no. 1 (2004): 10-18.
Borgmann, Albert. “Technology as a Cultural Force: For Alena and Griffin.” The Canadian Journal
of Sociology 31, no. 3 (2006): 353.
Botan, Carl. “Communication Work and Electronic Surveillance: A Model for Predicting Panoptic
Effects.” Communication Monographs 63, no.4 (1996): 294-313.
Bouville, Mathieu. “Whistle-Blowing and Morality.” Journal of Business Ethics 81 (2008): 579.
Bragues, George. “Seek the Good Life, Not Money: The Aristotelian Approach to Business Ethics.”
Journal of Business Ethics 67, no. 4 (2006): 341-357.
Branine, Mohamed and David Pollard. “Human Resource Management with Islamic Management
Principles: A Dialectic for a Reverse Diffusion in Management.” Personnel Review 39, no.
6(2010): 712-727.
Brenkert, George G. “Freedom, Participation and Corporations: The Issue of Corporate (Economic)
Democracy.” Business Ethics Quarterly 2, no. 3 (1992): 251-269.
Bressler, Martin S. and Linda Bressler. “Protecting Your Company's Intellectual Property Assets
from Cyber Espionage.” Journal of Legal, Ethical and Regulatory Issues 17, no. 2 (2014): 1-
15.
Brey, Philip. “Worker Autonomy and the Drama of Digital Networks in Organizations.” Journal of
Business Ethics 22, no. 1 (1999): 15-25.
Britz, J.J. “Technology as a Threat to Privacy: Ethical Challenges and Guidelines for the Information
Professionals.” Microcomputers for Information Management 13, no. 3-4 (1996): 175-193.
Broek, Diane van den. “We have the Values: Customers, Control and Corporate Ideology in Call
Centre Operations.” New Technology, Work and Employment 19, no. 1 (2004): 2-13.
Brown, Elizabeth A. “The Fitbit Fault Line: Two Proposals to Protect Health and Fitness Data at
Work.” Yale Journal of Health Policy, Law, and Ethics 16, no. 1 (2016): 1-49.
Brown, William S. “Ontological Security, Existential Anxiety, and Workplace Privacy.” Journal of
Business Ethics 23, no. 1 (2000): 61-65.
Bryant, Susan. “Electronic Surveillance in the Workplace.” Canadian Journal of Communication 20,
no. 4 (1995): 505-521.
Budhwar, Pawan S. “Doing Business in India.” Thunderbird International Business Review 43, no.
4 (2001): 549-568.
Budhwar, Pawan S., Arup Varma, Virender Singh and Rohin Dhar. “HRM Systems of Indian Call
Centres: An Exploratory Study.” International Journal of Human Resource Management 17,
no. 5 (2006): 881–897.
Bibliography
xxxv
Budhwar, Pawan S., Harsh K. Luthar and Jyotsna Bhatnagar. “The Dynamics of HRM Systems in
Indian BPO Firms.” Journal of Labour Research 27, no. 3 (2006): 339–360.
Burchard, MaryJo. “Ethical Dissonance and Response to Destructive Leadership: A Proposed
Model.” Emerging Leadership Journeys 4, no. 1 (2011): 154-176.
Burri, Mira and Rahel Schär. “The Reform of the EU Data Protection Framework: Outlining Key
Changes and Assessing Their Fitness for a Data-Driven Economy.” Journal of Information
Policy 6 (2016): 479-511.
Callaghan, George and Paul Thompson. “Edwards Revisited: Technical Control and Call Centres.”
Economic and Industrial Democracy 22, no. 1 (2001): 13-37.
Cantor, David E. “Maximizing the Potential of Contemporary Workplace Monitoring: Techno-
Cultural Developments, Transactive Memory, and Management Planning.” Journal of
Business Ethics Logistics 37, no. 1 (2016): 18-25.
Carayon, Pascale. “Effects of Electronic Performance Monitoring on Job Design and Worker Stress:
Review of the Literature and Conceptual Model.” Human Factors: The Journal of the Human
Factors and Ergonomics Society 35, no. 3 (1993): 385–395.
_________. “Effects of Electronic Performance Monitoring on Job Design and Worker Stress:
Results of Two Studies.” International Journal of Human–Computer Interaction 6, no. 2
(1994): 177–190.
Cascio, Wayne F. “Managing A Virtual Workplace.” Academy of Management Executive 14, no. 3
(2000): 81-90.
Cate, Fred H. and Viktor Mayer-Schönberger. “Notice and Consent in a World of Big Data.”
International Data Privacy Law 3 no. 2 (2013): 67-73.
Celik, Mücahit and Edip Dogan. “A Theoretical Approach to the Science of Management.”
International Journal of Humanities and Social Science 1, no. 3 (2011): 65-69.
Chang, Shuchih Ernest, Anne Yenching Liu and Sungmin Lin. “Exploring Privacy and Trust for
Employee Monitoring.” Industrial Management & Data Systems 115, no. 1 (2015): 88-106.
Chatterjee, Samir R. “Human Resource Management in India: ‘Where From’ and ‘Where To’?”
Research and Practice in Human Resource Management 15, no. 2 (2007): 92-103.
Chen Rui, Sanders G. Lawrence. “Electronic Monitoring in Workplace: Synthesis and Theorizing.”
AMCIS 2007 Proceedings, Paper 279, (2007): 1-8.
Chikere, Cornell C.and Jude Nwoka. “The Systems Theory of Management in Modern Day
Organizations: A Study of Aldgate Congress Resort Limited Port Harcourt.” International
Journal of Scientific and Research Publications 5, no. 9 (2015): 1-7.
Chirkov, Valery, Richard M. Ryan. Youngmee Kim and Ulas Kaplan. “A Self-Determination Theory
Perspective on Internalization of Cultural Orientations and Well-Being.” Journal of
Personality and Social Psychology 84, no.1 (2003): 97-110.
Bibliography
xxxvi
Chory, Rebecca M., Lori E. Vela and Theodore A. Avtgis. “Organizational Surveillance of
Computer-Mediated Workplace Communication: Employee Privacy Concerns and
Responses.” Employee Responsibilities and Rights Journal 28, no. 1 (2016): 23-43.
Ciocchetti, Corey A. “The Eavesdropping Employer: A Twenty-First Century Framework for
Employee Monitoring.” American Business Law Journal 48 (2011): 285-369.
Cleveland, Jeanette N., Zinta S. Byrne and T.M Cavanagh. “The Future of HR is RH: Respect for
Humanity at Work.” Human Resource Management Review 25, no. 2 (2015): 146-161.
Clynes, Manfred E. and Nathan S. Kline. “Cyborgs and Space.” Astronautics (September 1960): 26-
27, 74-76.
Cohen, Joel B. and Kunal Basu. “Alternative Models of Categorization: Toward a Contingent
Processing Framework.” Journal of Consumer Research 13, no. 4 (1987): 455-472.
Cohen, Julie E. “Examined Lives: Informational Privacy and the Subject as Object.” Stanford Law
Review 52, no. 5 (2000): 1373-1437.
Colbert, Amy, Nick Yee and Gerard George. “The Digital Workforce and the Workplace of the
Future.” Academy of Management Journal 59, no. 3 (2016): 731-739.
Collinson, David L. and Margaret Collinson. “Delayering Managers: Time-Space Surveillance and
its Gendered Effects.” Organization 4, no. 3 (1997): 375-407.
Conlon, Kevin J. “Privacy in the Workplace.” Chicago-Kent Law Review 72, no. 1 (1996): 285-296.
Conroy, Stephen J. and Tisha L. N. Emerson. “Business Ethics and Religion: Religiosity as a
Predictor of Ethical Awareness among Students.” Journal of Business Ethics 50, no. 4 (2004):
383-96.
Conry-Murray, A. “The Pros and Cons of Employee Surveillance.” Network Magazine 12, no. 2
(2001): 62-66.
Coultrup, Sherri and Patrick D. Fountain. “Effects of Electronic Monitoring and Surveillance on the
Psychological Contract of Employees: An Exploratory Study.” Proceedings of ASBBS 19, no.
1 (2012): 219-235.
Cox, Scott, Tanya Goette and Dale Young. “Workplace Surveillance and Employee Privacy:
Implementing an Effective Computer Use Policy.” Communications of the IIMA 5, no. 2
(2005): 57-66.
Cremers, Martijn. “What Corporate Governance Can Learn from Catholic Social Teaching.” Journal
of Business Ethics 145, no. 4 (2017): 711-724.
Culliton, James W. “Business and Religion.” Harvard Business Review 27, no. 3 (1949): 265-271.
Culnan, Mary J. and Pamela K. Armsstrong. “Information Privacy Concerns, Procedural Fairness,
and Impersonal Trust: An Empirical Investigation.” Organization Science 10, no. 1 (1999):
104-115.
Bibliography
xxxvii
D’Cruz, Premilla and Charlotte Rayner. “Bullying in the Indian Workplace: A Study of the ITES-
BPO Sector.” Economic and Industrial Democracy 34, no. 4 (2012): 597-619.
D’Cruz, Premilla and Ernesto Noronha. “Hope to Despair: The Experience of Organizing Indian Call
Centre Employees.” The Indian Journal of Industrial Relations 48, no. 3 (2013): 471-486.
_________. “Navigating the Extended Reach: Target Experiences of Cyberbullying at Work.”
Information and Organization 23 (2013): 324-343.
D'Cruz, Premilla, Megan Paull, Maryam Omari and Burcu Guneri-Cangarli, “Target Experiences of
Workplace Bullying: Insights from Australia, India and Turkey.” Employee Relations 38, no.
5 (2016): 805-823.
D’Rozario, Denver and Jerome D. Williams. “Retail Redlining: Definition, Theory, Typology, and
Measurement.” Journal of Macromarketing 25, no. 2 (2005): 175-186.
D’Urso, Scott C. “Who’s Watching Us at Work? Toward a Structural-Perceptual Model of Electronic
Monitoring and Surveillance in Organizations.” Communication Theory 16 (2006): 281-303.
David, Rick and Ron Henderson. “Electronic Performance Monitoring: A Laboratory Investigation
of the Influence of Monitoring and Difficulty on Task Performance, Mood State, and Self-
Reported Stress Levels.” Journal of Applied Social Psychology 30, no. 5 (2000): 906-920.
Davies, S.G. “The Case Against: CCTV Should Not Be Introduced.” International Journal of Risk,
Security and Crime Prevention 1, no. 4 (1998): 327-331.
Day, David V. and Deidra J. Schleicher. “Self-Monitoring at Work: A Motive-Based Perspective.”
Journal of Personality 74, no. 3 (2006): 685-713.
Day, David V., Derida J. Schleicher, Amy L. Unckless, and Nathan J. Hiller. “Self-Monitoring
Personality at Work: A Meta-Analytic Investigation of Construct Validity.” Journal of Applied
Psychology 87, no. 2 (2002): 390-401.
De Tavernier, Johan. “The Historical Roots of Personalism: From Renouvier’s Le Personnalisme,
Mounier’s Manifeste au service du personnalisme and Maritan’s Humanisme integral to
Janssens’ Personne et Societe.” Ethical Perspectives 16, no. 3 (2009): 361-392.
De Zwart, Frank. “The Logic of Affirmative Action: Caste, Class and Quotas in India.” Acta
Sociologica, 43, no. 3 (2000): 235–249.
Debnath, Nivedita and Kanika T. Bhal. “Polarization of Perceptions of IT-enabled Privacy Violations
at Workplace: Impact of Respondent Position, Peer Belief and Peer Pressure.” Global Journal
of Flexible Systems Management 4, no. 3 (2003): 15-20.
Deery, Stephen, Janet Walsh and Christopher D. Zatzick. “A Moderated Mediation Analysis of Job
Demands, Presenteeism, and Absenteeism.” Journal of Occupational and Organizational
Psychology 84 (2014): 352-369.
Bibliography
xxxviii
Deery, Stephen. Vandana Nath and Janet Walsh, “Why do off-shored Indian Call Centre Workers
Want to Leave Their Jobs?” New Technology, Work and Empowerment 28, no. 3 (2013): 212-
226.
Dekier, Łukasz. “The Origins and Evolution of Lean Management System.” Journal of International
Studies 5, no 1 (2012): 46-51.
Deleuze, Gilles. “Postscript on the Societies of Control.” October 59 (1992): 3-7.
https://files.nyu.edu/dnm232/public/deleuze_postcript.pdf [accessed January 15, 2017]. This
essay first appeared in L’Autre Journal 1 (1990).
Demirbag, Mehmet, Kamel Mellahi, Sunil Sahadev and Joel Elliston. “Employee Service
Abandonment in Offshore Operations: A Case Study of a US Multinational in India.” Journal
of Business Ethics 47 (2012): 178-185.
DePree, C. and R. Jude. “Who’s Reading Your Office Email? Is That Legal?” Strategic Finance 87,
no. 10 (2006): 44-47.
DeTienne, Kristen Bell. “Big Brother or Friendly Coach? Computer Monitoring in the 21st Century.”
The Futurist 27, no. 5 (1993): 33-37.
DiTecco, Don, G. Cwitco, A. Arsenault and M. André. “Operator Stress and Monitoring Practices.”
Applied Ergonomics 23, no. 1 (1992): 29-34.
Doney, Patricia M., Joseph P. Cannon and Michael R. Mullen. “Understanding the Influence of
National Culture on the Development of Trust.” The Academy of Management Review 23, no.
3 (1998): 601-620.
Donnelly, H. “Privacy in the Workplace.” Editorial Research Reports 1, no. 11 (1986): 214.
Dossani, Rafiq and Martin Kenney. “Lift and Shift; Moving the Back Office to India.” Information
Technologies and International Development 1, no. 2 (2003): 21-37.
Doty, Philip. “Digital Privacy: Toward a New Politics and Discursive Practice.” Annual Review of
Information Science and Technology 35 (2001): 115–245.
Drakopoulou-Dodd, Sarah and Paul Timothy Seaman. “Religion and Enterprise: An Introductory
Exploration.” Entrepreneurship Theory and Practice 23, no. 1 (1998): 71-86.
Drucker, Peter F. “What is Business Ethics?” Across the Board (October 1981): 22-32.
Dubbeld, Lynsey. “Observing Bodies, Camera Surveillance and the Significance of the Body.”
Ethics and Information Technology 5 (2003): 151-162.
Dubey, Mohit and Aarti Garg. “Contribution of Information Technology and Growth of Indian
Economy.” Voice of Research 2, no. 4 (2014): 49-53.
Duggar, Jan Warren. “The Role of Integrity in Individual and Effective Corporate Leadership.”
Journal of Academic and Business Ethics 3 (2009): 1-7.
Bibliography
xxxix
Dwivedi, Sulakshna, Sanjay Kaushik and Luxmi. “Impact of Organizational Culture on Commitment
of Employees: An Empirical Study of BPO Sector in India.” Vikalapa 39, no. 3 (2014): 77-92.
Ehnert, Ina, Sepideh Parsa, Ian Roper, Marcus Wagner, and Michael Muller-Camen. “Reporting on
Sustainability and HRM: A Comparative Study of Sustainability Reporting Practices by the
World’s Largest Companies.” The International Journal of Human Resource Management 27,
no. 1 (2016): 88-108.
Einarsen, Stale. “The Nature and Causes of Bullying at Work.” International Journal of Manpower
20, nos. 1/2 (1999): 16-27.
Eisenhardt, Kathleen M. “Agency Theory: An Assessment and Review.” The Academy of
Management Review 14, no. 1 (1989): 57-74.
Eivazi, Kathy. “Computer Use Monitoring and Privacy at Work.” Computer Law & Security Review
27 (2011): 516-523.
Ellway, Benjamin P.W. “Making It Personal in a Call Centre: Electronic Peer Surveillance.” New
Technology, Work and Employment 28, no. 1 (2013): 37-50.
Elvy, Stacy-Ann. “Commodifying Consumer Data in the Era of the Internet of Things.” Boston
College Law Review 59, no. 2 (2018): 423-522.
Emerson, Tisha L. N. and Joseph A. Mckinney. “Importance of Religious Beliefs to Ethical Attitudes
in Business.” Journal of Religion and Business Ethics 1, no. 2 (2010): 1-15.
Engster, Daniel. “Rethinking Care Theory: The Practice of Caring and the Obligation to Care.”
Hypatia 20, no. 3 (2005): 50-74.
Epstein, Richard A. “The Legal Regulation of Genetic Discrimination: Old Responses to New
Technology.” Boston University Law Review 74, no. 1 (1994): 1-23.
Esposito, Richard, Carl J. Kraenzel, Christopher G. Pepin and Antony I. Stein. “The New Workplace:
Are You Ready? How to Capture Business Value?” IBM Global Technological Services
(2011): 1-12.
Essen, Juliana. “Sufficiency Economy and Santi Asoke: Buddhist Economic Ethics for a Just and
Sustainable World.” Journal of Buddhist Ethics 17 (2010): 70-99.
Ewest, Timothy. “Christian Identity as Primary Foundation to Workplace Ethics.” Religions: A
Scholarly Journal 12 (2015): 22-30.
Fairweather, N. Ben. “Surveillance in Employment: The Case of Teleworking.” Journal of Business
Ethics 22, no. 1 (1999): 39-49.
Falk, Armin and Michael Kosfeld. “The Hidden Costs of Control.” The American Economic Review
96, no. 5 (2006): 1611-1630.
Fazekas, Christopher Pearson. “1984 is Still Fiction: Electronic Monitoring in the Workplace and
U.S. Privacy.” Duke Law & Technology Review 3, no. 1 (2004): 1-17.
Bibliography
xl
Fells, Michael J. “Fayol Stands the Test of Time.” Journal of Management History 6, no. 8 (2000):
345-360.
Filippi, Primavera De and Lionel Maurel. “The Paradoxes of Open Data and How to Get Rid of It?
Analyzing the Interplay between Open Data and Sui-Generis Rights on Databases.”
International Journal of Law and Information Technology 23 (2015): 1-22.
Findlay, Patricia and Alan McKinlay. “Surveillance, Electronic Communications Technologies and
Regulation.” Industrial Relations Journal 34, no. 4 (2003): 305-318.
Fink, Jessica. “In Defense of Snooping Employers.” University of Pennsylvania Journal of Business
Law 16, no. 2 (2014): 551-596.
Finkin, Matthew W. “Employee Privacy, American Values, and the Law.” Chicago-Kent Law
Review 72 (1996): 221-269.
Firoz, N., R. Taghi and J. Souckova. “E-mails in the Workplace: The Electronic Equivalent of ‘DNA’
Evidence.” Journal of American Academy of Business 8, no. 2 (2006): 71-78.
Flanagan, Julie A. “Restricting Electronic Monitoring in the Private Workplace.” Duke Law Journal
43, no. 6 (1994): 1256-1281.
Fleming, Peter and Andre Spicer. “Power in Management and Organization Science.” The Academy
of Management Annals 8, no. 1 (2014): 237-298.
Folger, Robert and Jerald Greenberg, “Procedural Justice: An Interpretive Analysis of Personnel
Systems.” Research in Personnel and Human Resources Management 3 (1985): 141-142.
Ford, Michael. “Two Conceptions of Worker Privacy.” Industrial Law Journal 31, no. 2 (2002):
135–155.
Foster, John Bellamy and Robert W. McChesney. “Surveillance Capitalism: Monopoly-Finance
Capital, the Military-Industrial Complex, and the Digital Age.” Monthly Review 66, no. 3
(2014): 1-31.
Freeman, R. Edward and Jeanne Liedtka. “Corporate Social Responsibility: A Critical Approach.”
Business Horizons 34, no. 4 (1991): 92-99.
Freeman, R. Edward. “Business Ethics at the Millennium.” Business Ethics Quarterly 10, no. 1
(2000): 169-180.
Frey, Bruno S. “Does Monitoring Increase Work Effort? The Rivalry with Trust and
Loyalty.” Economic Inquiry 31, no. 4 (1993): 663-670.
Fried, Charles. “Privacy.” The Yale Law Journal 77, no. 3 (1986): 475-493.
Frohman, Mark and Perry Pascarella. “Managing Change: Creating the Purposeful Organization.”
Industry Week 229, no. 5 (1986): 44-47.
Froomkin, A. Michael. “The Death of Privacy?” Stanford Law Review 52, no. 5 (2000): 1461-1543.
Bibliography
xli
Fryxell, Gerald E. and Michael E. Gordon. “Workplace Justice and Job Satisfaction as Predictors of
Satisfaction with Union and Management.” Academy of Management Journal 32, no. 4 (1989):
851-866.
Gaeta, Matteo and Rocco Palumbo. “Comparing two Approaches to Team Building: A Performance
Measurement Evaluation.” Team Performance Management: An International Journal 23, no.
7/8 (2017): 333-351.
Gagne, Margaret L., Joanne H. Gavin and Gregory J. Tully. “Assessing the Costs and Benefits of
Ethics: Exploring a Framework.” Business and Society Review 110, no. 2 (2005): 181-190.
Gagné, Maryléne and Edward L. Deci. “Self-Determination Theory and Work Motivation.” Journal
of Organizational Behaviour 26, no. 4 (2005): 331-362.
Galič, Maša, Tjerk Timan and Bert-Jaap Koops. “Bentham, Deleuze and Beyond: An Overview of
Surveillance Theories from the Panopticon to Participation.” Philosophy & Technology 30, no.
1 (2017): 9-37.
Gavison, Ruth E. “Privacy and the Limits of Law.” Yale Law Journal 89, no. 3 (1980): 421-471.
Gebhardt, Christiane. “The Impact of Managerial Rationality on the Organizational Paradigm: Role
Models in the Management of Innovation.” Technology Analysis & Strategic Management 17,
no. 1 (2005): 21-34.
Geeta, Vijaya. “Online Identity Theft – An Indian Perspective.” Journal of Financial Crime 18, no.
3 (2011): 235-246.
Ghani, Norihan Abdul, Suraya Hamid, and Nur Izura Udzir. “Big Data and Data Protection: Issues
with Purpose Limitation Principle.” International Journal of Advances in Soft Computing &
Its Applications 8, no. 3 (2016): 116-121.
Ghoshray, Saby. “Employer Surveillance Versus Employee Privacy: The New Reality of Social
Media and Workplace Privacy.” Northern Kentucky Law Review 40 (2013): 593-626.
Gichuhi, John Kimani, James Mark Ngari and Thomas Senaji. “Employees’ Response to Electronic
Monitoring: The Relationship between CCTV Surveillance and Employees’ Engagement.”
International Journal of Innovative Research & Development 5, no. 7 (2016): 141-150.
Gini, Al. “Meaningful Work and the Rights of the Worker: A Commentary on Rerum Novarum and
Laborem Exercens.” Thought: Fordham University Quarterly 67, no. 3 (1992): 226-239.
Glancy, Dorothy J. “The Invention of the Right to Privacy.” Arizona Law Review 21, no. 1 (1979):
1-39.
Glover, Rebecca J. “Relationships in Moral Reasoning and Religion among Members of
Conservative, Moderate, and Liberal Religious Groups.” The Journal of Social Psychology
137, no. 2 (1997): 247-254.
Goddard, Michelle. “The EU General Data Protection (GDPR): European Regulation That Has a
Global Impact.” International Journal of Market Research 59, no. 6 (2017): 703-705.
Bibliography
xlii
Gouri, Geeta. “The New Economic Policy and Privatization in India.” Journal of Asian Economics
8, no. 3 (1997): 455-479.
Graafland, Johan, Corie Mazereeuw and Aziza Yahia. “Islam and Socially Responsible Business
Conduct: An Empirical Study of Dutch Entrepreneurs.” Business Ethics: A European Review
15, no. 4 (2006): 390-406.
Grant, Rebecca and Christopher Higgins. “Monitoring Service Workers via Computer: The Effect
on Employees, Productivity, and Service.” National Productivity Review 8, no. 2 (1989): 101-
112.
Greenberg, Jerald. “Organizational Justice: Yesterday, Today, and Tomorrow.” Journal of
Management 16, no. 2 (1990): 399-432.
Greenberg, Liane and Julian Barling. “Predicting Employee Aggression against Co-workers,
Subordinates and Supervisors: The Roles of Person Behaviours and Perceived Workplace
Factors.” Journal of Organizational Behaviour 20, no. 6 (1999): 897-913.
Greenwood, Michelle. “Ethical Analyses of HRM: A Review and Research Agenda.” Journal of
Business Ethics 114, no. 2 (2013): 355-366.
Greller, Martin M. “Evaluation of Feedback Sources as a Function of Role and Organizational
Level.” Journal of Applied Psychology 65, no. 1 (1980): 24-27.
Griffith, Terri L. “Monitoring and Performance: A Comparison of Computer and Supervisor
Monitoring.” Journal of Applied Social Psychology 23 no. 7 (1993): 549-572.
Grodzinsky, Frances and Herman T. Tavani, “Privacy in “The Cloud”: Applying Nissenbausm’s
Theory of Contextual Integrity,” SIGCAS Computers and Society 41, no. 1 (2011): 38-47.
Gudykunst, William B., Ge Gao, Tsukasa Nishida, Michael H. Bond, Kwok Leung, Georgette Wang
and Robert A. Barraclough. “A Cross-Cultural Comparison of Self-monitoring.”
Communication Research Reports 6, no. 1 (1989): 7-12.
Guitián, Gregorio. “Service as a Bridge between Ethical Principles and Business Practice: A Catholic
Social Teaching Perspective.” Journal of Business Ethics 128, no. 1 (2015): 59-72.
Gumbus, Andra and Patricia Meglich. “Abusive Online Conduct: Discrimination and Harassment in
Cyberspace.” Journal of Management Policy and Practice 14, no. 5 (2013): 47-56.
Gunkel, David. “We Are Borg: Cyborgs and the Subject of Communication.” Communication
Theory 10, no. 3 (2000): 332-357.
Gürses, Seda and Jose M. del Alamo. “Privacy Engineering: Shaping an Emerging Field of Research
and Practice.” IEEE Security & Privacy 14, no. 2 (2016): 40-46.
Gvaramadze, Irakli. “Human Resource Development Practice: The Paradox of Empowerment and
Individualization.” Human Resource Development International 11, no. 5 (2008): 465-477.
Bibliography
xliii
Haggerty, Kevin D. and Richard V. Ericson. “The Surveillant Assemblage.” British Journal of
Sociology 51, no. 3 (2000): 605-622.
Ham, Maarten van, Clara H Mulder and Pieter Hooimeijer. “Spatial Flexibility in Job Mobility:
Macrolevel Opportunities and Microlevel Restrictions.” Environment and Planning 33 (2001):
921-940.
Hamburger, Philip A. “Natural Rights, Natural Law, and American Constitutions.” The Yale Law
Journal 102 (1993): 919-920.
Harman, Gilbert. “Moral Relativism as a Foundation for Natural Rights.” Journal of Libertarian
Studies 3 (1979): 367.
Harm, Mike. “Building the Factory of the Future with Digital Workplace.” Industry Today 21, no. 2
(2018): 6-21.
Hartinger-Saunders, Robin M. and Christine M. Rine. “The Intersection of Social Process and Social
Structure Theories to Address Juvenile Crime: Toward a Collaborative Intervention Model.”
Journal of Human Behaviour in the Social Environment 21, no. 8 (2011): 909-925.
Hartley, Nell Tabor. “Management History: An Umbrella Model.” Journal of Management History
12, no. 3 (2006): 277-292.
Hartman, Laura Pincus. “Ethics: The Rights and Wrongs of Workplace Snooping.” Journal of
Business Strategy 19, no. 3 (1998):16-19.
_________. “The Rights and Wrongs of Workplace Snooping.” The Journal of Business Strategy 19,
no. 3 (1998): 16-19.
Hash, Paul E. and Christina M. Ibrahim. “E-mail, Electronic Monitoring, and Employee Privacy.”
South Texas Law Review 37, no. 3 (1996): 893-910.
Healy, Josh and Tom Bramble. “Dial ‘B’ for Burnout? The Experience of Job Burnout in a Telephone
Call Centre.” Labour and Industry 14, no. 2 (2003): 39-59.
Heatherton, Todd F. “Neuroscience of Self and Self-Regulation.” Annual Review of Psychology 62,
no.1 (2011): 363-390.
Herrera, Federico, Gilbert Chan, Michel Legault, Raheemah Mohammad Kassim and Vikas Sharma.
“The Digital Workplace: Think, Share, Do.” Deloitte and Touche LLP (2011): 1-16.
Hertel-Fernandez, Alexander. “American Employers as Political Machines.” The Journal of Politics
79, no. 1 (2017): 105-117.
Hingst, Ray. “Perceptions of Working Life in Call Centres.” Journal of Management Practice 7, no.
1 (2006): 1-9.
Holland, Peter Jeffrey, Brian Cooper and Rob Hecker. “Electronic Monitoring and Surveillance in
the Workplace: The Effects on Trust in Management, and the Moderating Role of Occupational
Type.” Personnel Review 44, no. 1 (2015): 161-175.
Bibliography
xliv
Holman, David, Claire Chissick and Peter Totterdell. “The Effects of Performance Monitoring on
Emotional Labour and Well-Being in Call Centers.” Motivation and Emotions 26, no. 1 (2002):
57-81.
Holman, David. “Employee Well Being in Call Centres.” Human Resource Management Journal 12,
no. 4 (2002): 35-51.
Horne, Colin J. “The Case For: CCTV Should Be Introduced.” International Journal of Risk, Security
and Crime Prevention 1, no. 4 (1998): 317-326.
Huth, Carly L. “The Insider Threat and Employee Privacy: An Overview of Recent Case Law.”
Computer Law & Security Review 29 (2013): 368-381.
Iedema, Rick and Carl Rhodes. “The Undecided Space of Ethics in Organizational Surveillance.”
Organization Studies 31, no. 2 (2010): 199-217.
Introna, Lukas D. “Privacy and Computer: Why We Need Privacy in the Information Society.”
Metaphilosophy 28, no.3 (1997): 259-275.
_________. “Workplace Surveillance ‘is’ Unethical and Unfair.” Surveillance and Society 1, no. 2
(2003): 210-216.
Inyang, Benjamin James. “The Challenges of Evolving and Developing Management Indigenous
Theories and Practices in Africa.” International Journal of Business and Management 3, no.
12 (2008): 122-132.
Irving, R.H., C. A. Higgins, and F.R. Safayeni. “Computerized Performance Monitoring Systems:
Use and Abuse.” Communications of the ACM 29, no. 8 (1986): 794-801.
Ivancevich, John M. and J. Timothy McMahon. “The Effects of Goal Setting, External Feedback,
and Self-Generated Feedback on Outcome Variables: A Field Experiment.” Academy of
Management Journal 25, no. 2 (1982): 359-372.
Jahansoozi, Julia. “Organization-Stakeholder Relationships: Exploring Trust and Transparency.”
Journal of Management Development 25, no. 10 (2006): 942-955.
Jain, Samta, Namrata Mehta, and Varun Bagai. “A Study of Organizational Climate and Culture in
an Indian Nationalized Bank Using and Octapace Survey.” aWEshkar: A Peer Reviewed
Research Journal 18, no. 2 (2014): 52-70.
Janssens, Louis. “Artificial Insemination: Ethical Considerations.” Louvain Studies 8 (1980): 3-29.
Järlström, Maria, Essi Saru and Sinikka Vanhala. “Sustainable Human Resource Management with
Salience of Stakeholders: A Top Management Perspective.” Journal of Business Ethics 152,
no. 3 (2018): 703-724.
Jaswal, Vidushi. “Psychological Effects of Workplace Surveillance on Employees, and the Legal
Protection: An Analysis.” Bharati Law Review (Jan.- March 2017): 59-69.
Bibliography
xlv
Jensen, Jaclyn M and Jana L. Raver. “When Self-Management and Surveillance Collide:
Consequences for Employees’ Organizational Citizenship and Counterproductive Work
Behaviours.” Group & Organization Management 37, no. 3 (2012): 308-346.
Jeurissen, Ronald. “Institutional Conditions of Corporate Citizenship.” Journal of Business Ethics
53 (2004): 87-96.
Jhunjhunwala, Soniya. “Review of Indian Work Culture and Challenges Faced by Indians in the Era
of Globalization.” Interscience Management Review 2, no. 2 (2012): 67-70.
Jindal, Rakhi, Gowree Gokhale and Vikram Shroff. “The Indian Legal Position on Employee Data
Protection and Employee Privacy.” Employment & Industrial Relations Law (2012): 47-49.
John, Bernadette. “Are You Ready for General Data Protection Regulation?” BMJ 360: k941 (2018):
1-2.
Johns, Gary. “Presenteeism in the Workplace: A Review and Research Agenda.” Journal of
Organizational Behaviour 31 (2010): 519-542.
Johnson, Richard A., Fremont E. Kast and James E. Rosenzweig. “Systems Theory and
Management.” Management Science 10, no. 2 (1964): 367-384.
Joshi, Seema. “From Conventional to New Services: Broadened Scope of Tertiary Sector.” The
Indian Journal of Labour Economics 49, no. 2 (2006): 321-336.
_________. “Tertiary Sector-Driven Growth in India: Impact on Employment and Poverty.”
Economic and Political Weekly 39, no. 37 (2004a): 4175-4178.
Junglas, Iris A. and Richard T. Watson. “Location-Based Services: Evaluating User Perceptions of
Location-Tracking and Location-Awareness Services.” Communications of the ACM 51, no. 3
(2008): 65-69.
Jütten, Timo. “Dignity, Esteem, and Social Contribution: A Recognition-Theoretical View.” The
Journal of Political Philosophy 25, no. 3 (2017): 259-280.
Kadam, Alka Mohan. “Purushartha in 21st Century.” Online International Interdisciplinary Research
Journal 5, no. 4 (2015): 441-448.
Kagan, Shelly. “Rethinking Intrinsic Value.” Journal of Ethics 2, no. 4 (1998): 277-297.
Kanagasabapathi, P. “Ethics and Values in Indian Economy and Business.” International Journal of
Social Economics 34, no. 9 (2007): 577-585.
Kaupins, Gundars and Malcolm Coco. “Perceptions of Internet-of-Things Surveillance by Human
Resource Managers.” S.A.M. Advanced Management Journal 82, no. 1 (2017): 53-61, 68.
Kesan, Jay P. “Cyber-Working or Cyber-Shirking? A First Principles Examination of Electronic
Privacy in the Workplace.” Florida Law Review 54 (2002): 289-332.
Bibliography
xlvi
Khan, Nawsher, Ibrar Yqoob, Ibrahim Abaker Targio Hashem and Abdullah Gani. “Big Data:
Survey, Technologies, Opportunities, and Challenges.” The Scientific World Journal (2014):
1-18.
Khan, Shahadat Hossain. “Phenomenography: A Qualitative Research Methodology in Bangladesh.”
International Journal on New Trends in Education and Their Implications 5, no. 2 (2014): 34-
43.
Khanna, Harjeev Kumar, S.C. Laroiya and D.D. Sharma. “Quality Management in Indian
Manufacturing Organizations: Some Observations and Results from a Pilot Survey.” Brazilian
Journal of Operations & Production Management 7, no. 1 (2010): 141-162.
Khatri, Naresh, Chong Tze Fern and Pawan Budhwar. “Explaining Employee Turnover in an ASIAN
Context.” Human Resource Management Journal 11, no. 1 (2001): 54-74.
Kidwell, Roland E. “Loafing in the 21st Century: Enhanced Opportunities – and remedies – for
Withholding Job Effort in the New Workplace.” Business Horizons 53 (2010): 543-552.
Kidwell, Roland E. Jr. and Nathan Bennett. “Electronic Surveillance as Employee Control: A
Procedural Justice Interpretation.” The Journal of High Technology Management Research 5,
no. 1 (1994): 39-57.
_________. “Employee Reactions to Electronic Control Systems: The Role of Procedural Fairness.”
Group & Organizational Management 19, no. 2 (1994): 203-218.
Kidwell, Ronald E. and Robert Sprague. “Electronic Surveillance in the Global Workplace: Laws,
Ethics, Research and Practice.” New Technology, Work and Employment 24, no. 2 (2009): 194-
208.
Kierkegaard, Sylvia. “Privacy in Electronic Communication Watch Your E-Mail: Your Boss is
Snooping.” Computer Law & Security Report 21, no. 3 (2005): 226-236.
Kim, Chigon. “Review of Work in the New Economy: Flexible Labour Markets in Silicon Valley.”
By Chris Benner. American Journal of Sociology 109, no. 1 (2003): 232-234.
Kim, Mun-Cho. “Surveillance Technology, Privacy and Social Control: With Reference to the Case
of the Electronic National Identification Card in South Korea.” International Sociology 19, no.
2 (2004): 193-213.
Kinjerski, Val M. and Berna J. Skrypnek. “Creating Organisational Conditions that Foster Employee
Spirit at Work.” Leadership and Organisation Development Journal 27, no. 4 (2006): 280-295.
Kitana, Abdelkarim. “Overview of the Managerial Thoughts and Theories from the History:
Classical Management Theory to Modern Management Theory.” Indian Journal of
Management Science 6, no.1 (2016): 16-21.
Klau, Friedrich and Axel Mittelstadt. “Labour Market Flexibility.” OECD Journal: Economic
Studies 6 (1986): 7-45.
Bibliography
xlvii
Kleve, P., R.V. De Mulder and K. van Noortwijk. “Surveillance Technology and the Law: The Social
Impact.” International Journal of Intercultural Information Management 1, (2007): 2-16.
Knights, David and Darben McCabe. “What Happens When the Phone Goes Wild? Staff, Stress and
Spaces for Escape in a BPR Telephone Banking Work Regime.” Journal of Management
Studies 35, no. 2 (1998): 163-194.
Knights, David and Darben McCabe. “What Happens When the Phone Goes Wild? Staff, Stress and
Spaces for Escape in a BPR Telephone Banking Work Regime.” Journal of Management
Studies 35, no. 2 (1998): 163-194.
Koehn, Daryl. “A Role for Virtue Ethics in the Analysis of Business Practice.” Business Ethics
Quarterly 5, no. 3 (1995): 533-539.
Köksal, Büyük and Uğur Keskin. “Panopticon’s Electronic Resurrection: Workplace Monitoring as
an Ethical Problem.” Turkish Journal of Business Ethics 5, no. 10 (2012): 75-88.
Kolk, Ans, Rob van Tulder, and Carlijn Welters. “International Codes of Conduct and Corporate
Social Responsibility: Can Transnational Corporations Regulate Themselves?” Transnational
Corporations 8, no. 1 (1999): 143-179.
Komaki, J. L., S. Slotnick, and Jensen, M. “Development of an Operant-based Taxonomy and
Observational Index of Supervising Behaviours.” Journal of Applied Psychology 71 (1986):
260-269.
Konovsky, Mary A. “Understanding Procedural Justice and Its Impact on Business Organizations.”
Journal of Management 26, no. 3 (2000): 489-511.
Kopalle, Praveen K., Donald R. Lehmann and John U. Farley. “Consumer Expectations and Culture:
The Effect of Belief in Karma in India.” Journal of Consumer Research 37, no. 2 (2010): 251-
263.
Kousaadikar, Anant and Trivender Kumar Singh. “Advantages and Disadvantages of Privatisation
in India.” International Journal of Advanced System and Social Engineering Research 3, no. 1
(2013): 18-22.
Kramer, Roderick M. “Trust and Distrust in Organizations: Emerging Perspectives, Enduring
Questions.” Annual Review of Psychology 50 (1999): 569-598.
Kumar, Arun and Priyadarshani Singh, “Principles and Practices of Workplace Management in
Information Age.” International Journal of Advanced Research in Management and Social
Science 3, no. 4 (2014): 21-34.
Kumar, M. Vimal and Sriganga B.K. “A Review on Data Mining Techniques to Detect Insider Fraud
in Banks” International Journal of Advanced Research in Computer Science and Software
Engineering 4, no. 12 (2014): 370-380.
Kumar, Madhu Ranjan and Shankar Sankaran. “Indian Culture and the Culture for TQM: A
Comparison.” The TQM Magazine 19, no. 2 (2007): 176-188.
Bibliography
xlviii
Kumar, Nagesh and K. J. Joseph. “Export of Software and Business Process Outsourcing from
Developing Countries: Lessons from the Indian Experience.” Asia-Pacific Trade and
Investment Review 1, no. 1 (2005): 91-110.
Kumar, Raj, Dixit Garg and T.K. Garg. “Total Quality Management in Indian Industries: Relevance,
Analysis and Directions.” The TQM Journal 21, no. 6 (2009): 607-622.
Kumar, Robin. “Beyond Strategic Human Resource Management: Is Sustainable Human Resource
Management the Next Approach?” The International Journal of Human Resource
Management 25, no. 8 (2014): 1069-1089.
Kumar, Robin and Sugumar Mariappanadar. “Call for Papers for a Special Issue: Sustainable Human
Resource Management.” Asia Pacific Journal of Human Resources 53 (2015): 389-392.
Kumar, Vikas. “JIT Based Quality Management: Concepts and Implications in Indian Context.”
International Journal of Engineering Science and Technology 2, no. 1 (2010): 40-50.
Kumari, Geetha, Gaurav Joshi and K.M. Pandey. “Factors Influencing of Job Satisfaction among
Employees in Software Industries: A Case Study of Wipro Ltd., Greater Noida, India.”
Advances in Economics and Business Management 2, no. 7 (2015): 751-755.
Kupfer, Joseph. “Privacy, Autonomy, and Self-Concept.” American Philosophical Quarterly 24
(1987): 81-82.
Kushner, D. “Big Brother at Work.” IEEE Spectrum 41, no. 12 (2004): 57–58.
Lally, Laura. “Privacy versus Accessibility: The Impact of Situationally Conditioned Belief.”
Journal of Business Ethics 15, no. 11 (1996): 1221-1226.
Lammers, Joris, Diederik A. Stapel and Adam D. Galinsky. “Power Increases Hypocrisy: Moralizing
in Reasoning, Immorality in Behaviour.” Psychological Science 21, no. 5 (2010): 737-744.
Landstrom, Hans. “Agency Theory and Its Application to Small Firms: Evidence from the Swedish
Venture Capital Market.” The Journal of Entrepreneurial Finance 2, no. 3 (1993): 203-218.
Laney, Doug. “3D Data Management: Controlling Data Volume, Velocity, and Variety.” Application
Delivery Strategies: Meta Delta (6 February 2001): 1-3.
Lankshear, Gloria, Peter Cook, David Mason, Sally Coates and Graham Button. “Call Centre
Employees’ Responses to Electronic Monitoring: Some Research Findings.” Work,
Employment & Society, 15, no. 3 (2001), 595-605.
Leana, Carrie R. and Harry J. van Buren III. “Organizational Social Capital and Employment
Practices.” Academy of Management Review 24, no. 3 (1999): 538-555.
Lee, Jintae and Younghwa Lee. “A Holistic Model of Computer Abuse within Organizations.”
Information Management & Computer Security 10, no. 2 (2002): 57-63.
Lee, Man Yee Karen. “Universal Human Dignity: Some Reflections in the Asian Context.” Asian
Journal of Comparative Law 3, no. 1 (2008): 283–313.
Bibliography
xlix
Lee, Samantha and Brian H. Kleiner. “Electronic Surveillance in the Workplace.” Management
Research News 26, nos. 2/3/4 (2003): 72-81.
Liao, Shu-Hsien, Pei-Hui Chu, and Pei-Yuan Hsiao. “Data Mining Techniques and Applications –
A Decade Review from 2000 to 2011.” Expert Systems with Applications 39 (2012): 11303–
11311.
Liégeois, Alex. “Louvain Personalism as Foundation of Ethics: A Revision in the Care Context.”
Louvain Studies 40 (2017): 410-421.
Limberg, Louise. “Phenomenography: A Relational Approach to Research on Information Needs,
Seeking and Use.” The New Review of Information Behaviour Research 1 (2000): 51-67.
Longenecker, Justin G., Joseph A. McKinney and Carlos W. Moore. “Religious Intensity,
Evangelical Christianity, and Business Ethics: An Empirical Study.” Journal of Business Ethics
55, no. 4 (2004): 373-86.
Lucas, Kristen. “Workplace Dignity: Communicating Inherent, Earned, and Remediated Dignity.”
Journal of Management Studies 52, no. 5 (2015): 621-646.
Lund, Jay R. “Electronic Performance Monitoring: A Review of the Research Issues.” Applied
Ergonomics 23, no. 1 (1992): 54-58.
Luthans, Fred and Todd I. Stewart. “A General Contingency Theory of Management.” The Academy
of Management Review 2, no. 2 (1977): 181-195.
Luthans, Fred. “The Contingency Theory of Management: A Path Out of the Jungle.” Business
Horizons 16, no 3 (1973): 67-72.
Lyon, David. “Surveillance, Snowden, and Big Data: Capacities, Consequences, Critique.” Big Data
& Society 1, no. 2 (2014):1-13.
_________. “National ID Cards: Crime-Control, Citizenship and Social Sorting.” Policing 1, no.1
(2007): 111-118.
_________. “Surveillance, Security and Social Sorting: Emerging Research Priorities.” International
Criminal Justice Review 17, no. 3 (2007): 161-170.
Macke, Janaina and Denise Genari. “Systematic Literature Review on Sustainable Human Resource
Management.” Journal of Cleaner Production 208 (2019 [Available online: 16 October 2018]):
806-815.
Magee, Joe C. and Adam D. Galinsky. “Social Hierarchy: The Self-Reinforcing Nature of Power and
Status.” The Academy of Management Annals 2, no. 1 (2008): 351-398.
Mahadevan, B. “Are Indian Companies Ready for Just-in-Time.” IIMB Management Review 9, nos.
2, 3 (1997): 85-92.
Mahamood, Ziarab, Muhammad Basharat and Zahid Bashir. “Review of Classical Management
Theories.” International Journal of Social Sciences and Education 2, no. 1 (2012): 512-522.
Bibliography
l
Majumdar, Sumit K., Kenneth L. Simons and Ashok Nag. “Body Shopping versus Offshoring among
Indian Software and Information Technology Firms.” Information Technology and
Management 12 (2011): 17-34.
Malgieri, Gianclaudio and Bart Custers. “Pricing Privacy – The Right to Know the Value of Your
Personal Data.” Computer Law & Security Review 34 (2018): 289-303.
Malhotra, Neeru, Pawan Budhwar and Peter Prowse. “Linking Rewards to Commitment: An
Empirical Investigation of Four UK Call Centres.” International Journal of Human Resource
Management 18, no. 2 (2007): 2095–2127.
Mann, Steve, Jason Nolan, and Barry Wellman. “Sousveillance: Inventing and Using Wearable
Computing Devices for Data Collection in Surveillance Environments.” Surveillance & Society
1, no. 3 (2003): 331-355.
Manworren, Nathan, Joshua Letwat and Olivia Daily. “Why You Should Care About the Target Data
Breach.” Business Horizons 59 (2016): 257-266.
Marchington, Mick. “Human Resource Management (HRM): Too Busy Looking Up to See Where
It is Going Longer Term?” Human Resource Management Review 25, no. 2 (2015): 176-187.
Martin, C.L. and D.H. Nagao. “Some Effects of Computerized Interviewing on Job Applicant
Responses.” Journal of Applied Psychology 74 (1989): 72-80.
Martin, Kirsten E. and R. Edward Freeman. “Some Problems with Employee Monitoring.” Journal
of Business Ethics 43, no. 4 (2003): 353-361.
Martinez-Balleste, A. and Agusti Solanas. “An Introduction to Privacy Aspects of Information and
Communication Technologies.” World Scientific Review 4, no.5 (2009): 1-20.
Marton, Ference. “Phenomenography - A Research Approach to Investigating Different
Understandings of Reality.” Journal of Thought 21, no. 3 (1986): 28-49.
_________. “Phenomenography: Describing Conceptions of the World Around Us.” Instructional
Science 10, (1981): 177-200.
Marx, Gary T. “Ethics for the New Surveillance.” The Information society 14, no. 3 (1998): 171-185.
Mason, David, Graham Button, Gloria Lankshear, Sally Coates and Wes Sharrock. “On the Poverty
of Apriorism: Technology, Surveillance in the Workplace and Employee Responses.”
Information, Communication & Society 5, no. 4 (2002): 555-572.
Mauksch, Stefanie. “Beyond Managerial Rationality: Exploring Social Enterprise in Germany.”
Social Enterprise Journal 8, no. 2 (2012): 156-170.
McEvoy, S. “E-mail and Internet Monitoring and the Workplace: Do Employees have a Right to
Privacy?” Communications and the Law 24, no. 2 (2002): 69-84.
Bibliography
li
McHardy, Jeffrey M. and Kathryn R. Stam. “Information Technology, Privacy, and Power within
Organizations: A View from Boundary Theory and Social Exchange Perspectives.”
Surveillance & Society 1, no. 2 (2003): 152-190.
McKee, Heidi A. “Policy Matters Now and in the Future: Net Neutrality, Corporate Data Mining,
and Government Surveillance.” Computers and Composition 28 (2011): 276-291.
Megginson, William L., and Jeffry M. Netter. “From State to Market: A Survey of Empirical Studies
on Privatization.” Journal of Economic Literature 39 (2001): 321-339.
Mehra, Ajay, Martin Kilduff and Daniel J. Brass. “The Social Networks of High and Low Self-
Monitors: Implications for Workplace Performance.” Administrative Science Quarterly 46, no.
1 (2001): 121-146.
Mehta, Namish, Prakash Verma and Nitin Seth. “Understanding Total Quality Management in
Context: International and Indian Service Industry.” Current World Environment 4, no. 2
(2009): 285-292.
Mele, Christina, Jacqueline Pels and Francesco Polese. “A Brief Review of Systems Theories and
Their Managerial Applications.” Service Science 2, no. 1/2 (2010): 126-135.
Melé, Domènec and Joan Fontrodona. “Christian Ethics and Spirituality in Leading Business
Organizations: Editorial Introduction.” Journal of Business Ethics 145, no. 4 (2017): 671-679.
Melé, Domènec. “Antecedents and Current Situation of Humanistic Management.” African Journal
of Business Ethics 7, no. 2 (2013): 52-61.
_________. “Editorial Introduction: Towards a More Humanistic Management.” Journal of Business
Ethics 88, no. 3 (2009): 413-416.
_________. “Human Quality Treatment: Five Organizational Levels.” Journal of Business Ethics
120, no. 4 (2014): 457-471.
_________. “Integrating Personalism into Virtue-Based Business Ethics: The Personalist and the
Common Good Principles.” Journal of Business Ethics 88, no. 1 (2009): 227-244.
_________. “Organizational Humanizing Cultures: Do They Generate Social Capital?” Journal of
Business Ethics 45, no. 1-2 (2003): 3-14.
_________. “The Challenge of Humanistic Management.” Journal of Business Ethics 44, no. 1
(2003): 77-88.
_________. “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos.”
Journal of Business Ethics 106, no. 1 (2012): 89-101.
Miller, Seumas and John Weckert. “Privacy, the Workplace and the Internet.” Journal of Business
Ethics 28, no. 3 (2000): 255-265.
Mishra, Jitendra M. and Suzanne M. Crapton. “Employee Monitoring: Privacy in the Workplace?”
S.A.M. Advanced Management Journal 63, no. 3 (1998): 4-15.
Bibliography
lii
Mitrou, Lilian and Maria Karyda. “Employees’ Privacy vs. Employers’ Security: Can they be
Balanced?” Telematics and Informatics 23, no. 3 (2006): 164-178.
Modassir, Tooba and Ramesh B. “Women Representation in Corporate Boards of BSE Listed
Companies and Causes of Their Low Workforce Participation in India.” International Journal
on Arts, Management and Humanities 4, no. 1 (2015): 51-56.
Moid, Sana. “A Theoretical Construct of the Impact of Religious Beliefs on Accounting Practices in
the Indian and Global Context.” NMIMS Management Review 31 (2016): 90-103.
Monahan, Torin. “Built to Lie: Investigating Technologies of Deception, Surveillance, and Control.”
The Information Society 32, no. 4 (2016): 229-240.
_________. “Editorial: Surveillance Inequality.” Surveillance & Society 5, no. 3 (2008): 217-226.
Moor, James H. “The Ethics of Privacy Protection.” Library Trends 39, nos. 1-2 (1990): 69-82.
_________. “Towards a Theory of Privacy for the Information Age.” Computers and Society 27, no.
3 (1997): 27-32.
Moore, Adam D. “Privacy: Its Meaning and Value.” American Philosophical Quarterly 40, no. 3
(2003): 215-227.
_________. “Employee Monitoring and Computer Technology: Evaluative Surveillance v. Privacy.”
Business Ethics Quarterly 10, no. 3 (2000): 697-709.
Moore, Lori L., Dustin K. Grabsch, and Craig Rotter. “Using Achievement Motivation Theory to
Explain Student Participation in a Residential Leadership Learning Community.” Journal of
Leadership Education 9, no. 2 (2010): 22-34.
Moore, Phoebe and Andrew Robinson. “The Quantified Self: What Counts in the Neoliberal
Workplace.” New Media and Society 18, no.1 (2016): 2774-2792.
Moore, Phoebe and Lukasz Piwek. “Regulating Wellbeing in the Brave New Quantified Workplace.”
Employee Relations 39, no. 3 (2017): 308-316.
Morris, Christopher W. “What are the Natural Rights? A New Account.” Reason Papers 9 (1983):
61-64.
Motkuri, Venkatanarayana. “Workforce in Indian Information Technology (IT) Industry: Exploring
NSS Employment and Unemployment Survey.” MPRA Paper No. 48411, Centre for
Economics and Social Studies, Hyderabad (2009): 1.
Moussa, Mahmoud. “Monitoring Employee Behaviour Through the Use of Technology and Issues
of Employee Privacy in America.” SAGE Open 5, no. 2 (2015): 1-15.
Muhl, Charles J. “The Employment-at-Will Doctrine: Three Major Exceptions.” Monthly Labour
Review 124, no.1 (2001): 3-11.
Bibliography
liii
Mujtaba, Bahaudin G. “Ethical Implications of Employee Monitoring: What Leaders Should
Consider.” Journal of Applied Management and Entrepreneurship 8, no.3 (2003): 22-47.
Muraven, Mark and Roy F. Maumeister. “Self-Regulation and Depletion of Limited Resources: Does
Self-Control Resemble a Muscle?” Psychological Bulletin 126, no. 2 (2000): 247-259.
Murphy, Jonathan. “Indian Call Centre Workers: Vanguard of a Global Middle Class?” Work,
Employment and Society 25, no. 3 (2011): 417-433.
Muylaert, Camila Junqueira, Vicente Sarubbi Jr., Paulo Rogério Gallo, Modesto Leite Rolim Neto
and Alberto Olavo Advincula Reis. “Narrative Interviews: An Important Resources in
Qualitative Research.” Revista da Escola de Enfermagem da USP 48, no. 2 (2014): 184-189.
Mythen, Gabe. “Employment, Individualization and Insecurity: Rethinking the Risk Society
Perspective.” The Sociological Review 53, no. 1 (2005): 129-149.
Naumann, Stefanie E. “The Effects of Norms and Self-monitoring on Helping Behaviour.” Journal
of Business Behavioural Studies 2 (2010): 1-10.
Nebeker, Delbert M. and B. Charles Tatum. “The Effects of Computer Monitoring, Standards, and
Rewards on Work Performance, Job Satisfaction and Stress.” Journal of Applied Social
Psychology 23 no. 7 (1993): 508-536.
Neihoff, B.P. and R.H. Moorman. “Justice as a Mediator of the Relationship between Methods of
Monitoring and Organisational Citizenship Behaviour.” Academy of Management Journal 36
(1993): 527-556.
Neil M. Richards, “The Dangers of Surveillance,” Harvard Law Review 126 (2013): 1934-1965.
Neuman, Joel H. and Robert A. Baron. “Workplace Violence and Workplace Aggression: Evidence
Concerning Specific Forms, Potential Causes, and Preferred Targets.” Journal of Management
24, no. 3 (1998): 391-419.
Niehoff, Brian P. and Robert H. Moorman. “Justice as a Mediator of the Relationship between
Methods of Monitoring and Organizational Citizenship Behaviour.” The Academy of
Management Journal 36, no. 3 (1993): 527–556.
Nielson, Ivy K., Steve M. Jex and Gary A. Adams. “Development and Validation of Scores on a
Two-Dimensional Workplace Friendship Scale.” Educational and Psychological Measurement
60, no. 4 (2000): 628–643.
Nigam, Roli and Zhan Su. “Management in Emerging versus Developed Countries: A Comparative
Study from an Indian Perspective.” Journal of CENTRUM Cathedra 4, no. 1 (2011): 121-133.
Nissenbaum, Helen. “Privacy as Contextual Integrity.” Washington Law Review 79, no. 1 (2004):
101-139.
_________. “Protecting Privacy in an Information Age: The Problem of Privacy in Public.” Law and
Philosophy 17 (1998): 559-596.
Bibliography
liv
Norling, Per. “Call Centre Companies and New Patterns of Organization.” Economic and Industrial
Democracy 22, no. 1 (2001): 155-168.
Noronha, Ernesto and Premilla D’Cruz. “Engaging in Professional: Organising Call Centre Agents
in India.” Industrial Relations Journal 40, no. 3 (2009): 215-234.
O’Brien, David M. “Privacy and the Right of Access: Purposes and Paradoxes of Information
Control.” Administrative Law Review 30, no. 1 (1978): 45-92.
Ogriseg, Claudia. “GDPR and Personal Data Protection in the Employment Context.” Labour & Law
Issues 3, no. 2 (2017): 1-24.
Oktay, M. Frauk, Suleyman Dasdag, Mesut Akdere, Sebahattin Cureoglu and Musa Cebe.
“Occupational Safety: Effects of Workplace Radiofrequencies on Hearing Function.” Archives
of Medical Research 35 (2004): 517-521.
Oliver, H. “Email and Internet Monitoring in the Workplace: Information Privacy and Contracting-
Out.” Industrial Law Journal 31, no. 4 (2002): 321–352.
Organ, D. W. “Organizational Citizenship Behaviour: It’s Construct Clean-up Time.” Human
Performance, 10 (1997): 85-97.
Osunde, Carl, Joshi Ashima, Vyas Anup, and Gargh Shankar. “Management Problems and Practices:
India and Nigeria.” Advances in Management 8, no. 1 (2015): 9-14.
Othman, Khatijah. “Work Ethics and Quality Workplace: An Observation from the Conventional
and Islamic Application.” ‘Ullūm Islamiyyah Journal 17 (2016): 79-102.
Oz, Effy, Richard Glass and Robert Behling. “Electronic Workplace Monitoring: What Employees
Think.” Omega, The International Journal of Management Science 27 (1999):167-177.
Paine, Lynn S. “Managing for Organizational Integrity.” Harvard Business Review 72, no. 2 (1994):
106-117.
Palm, Elin. “Conditions under which Surveillance may be Ethically Justifiable: Remarks on Kevin
Macnish's Proposed Normative Theory of Surveillance.” Surveillance & Society 12, no. 1
(2014): 164-170.
_________. “Securing Privacy at Work: The Importance of Contextualized Consent.” Ethics of
Information Technology 11, no. 4 (2009): 233-241.
Pang, Ming Fai. “Two Faces of Variation: On Continuity in the Phenomenographic Movement.”
Scandinavian Journal of Educational Research 47, no. 2 (2003): 145-156.
Parakandi, Mohammed and Mohamed Behery. “Sustainable Human Resources: Examining the
Status of Organizational Work–Life Balance Practices in the United Arab Emirates.”
Renewable and Sustainable Energy Reviews 55 (2016): 1370-1379.
Parent, W. A. “Privacy, Morality, and the Law.” Philosophy and Public Affairs 12, no.4 (1983): 269-
288.
Bibliography
lv
Park, Heungsik and John Blenkinsopp. “The Roles of Transparency and Trust in the Relationship
between Corruption and Citizen Satisfaction.” International Review of Administrative Science
77, no. 2 (2011): 254-274.
Patel, Nipul and Susan E. Conners. “Outsourcing: Data Security and Privacy Issues in India.” Issues
in Information Systems 9, no. 2 (2008): 14-20.
Pedersen, Jorgen Dige. “Explaining Economic Liberalization in India: State and Society
Perspective.” World Development 28, no.2 (2000): 265-282.
Persson, Anders J. and Sven Ove Hansson. “Privacy at Work: Ethical Criteria.” Journal of Business
Ethics 42, no. 1 (2003): 59-70.
Peter Bain and Phil Taylor, “Entrapped by the ‘Electronic Panopticon’? Worker Resistance in the
Call Centre,” New Technology, Work, and Employment 15, no. 1 (2000): 2-18.
Petitta, Laura and Michele Vecchione. “Job Burnout, Absenteeism, and Extra Role Behaviours.”
Journal of Workplace Behavioural Health 26, no. 2 (2011): 97-121.
Pfeffer, Jeffrey. “Human Resources from an Organizational Behaviour Perspective: Some Paradoxes
Explained.” The Journal of Economic Perspectives 21, no. 4 (2007): 115-134.
Pindur, Wolfgang, Sandra E. Rogers and Pan Suk Kim. “The History of Management: A Global
Perspective.” Journal of Management History 1, no. 1 (1995): 59-77.
Pirson, Michael, Anuj Gangahar and Fiona Wilson. “Humanistic and Economistic Approaches to
Banking: Better Banking Lessons from the Financial Crisis.” Business Ethics: A European
Review 25, no. 4 (2016): 400-415.
Piturro, Marlene C. “Employee Performance Monitoring... Or Meddling?” Management Review 78,
no. 5 (1989): 31-33.
Pohankar, Sweety. “Research Article on Organizational Culture as a Driving Tool for Developing
and Improving Managerial Effectiveness.” Research Journal of Management Sciences 4, no.
11 (2015):11-17.
Polkinghorne, Donald. “Narrative Configuration in Qualitative Analysis.” Qualitative Studies in
Education 8, no. 1 (1995): 5-23.
Porter, David. “Insider Fraud: Spotting the Wolf in Sheep’s Clothing.” Computer Fraud & Security
4 (2003): 12-15.
Porter, Michael E. and Mark R. Kramer. “Creating Shared Value: How to Reinvent Capitalism - and
Unleash a Wave of Innovation and Growth.” Harvard Business Review 89, nos. 1-2 (2011): 1-
17.
Post, Robert C. “The Social Foundations of Privacy: Community and Self in the Common Law Tort.”
California Law Review 77, no. 5 (1989): 957-1010.
_________. “Three Concepts of Privacy.” The Georgetown Law Journal 89 (2001): 2087-2098.
Bibliography
lvi
Poster, Winifred R. “Emotion Detectors, Answering Machines, and E-Unions: Multi-Surveillances
in the Global Interactive Service Industry.” American Behavioural Scientist 55, no.7 (2011):
868-901.
_________. “Who’s on the Line? Indian Call Centre Agents Pose as Americans for U.S.-Outsourced
Firms.” Industrial Relations 46, no. 2 (2007): 271-304.
Poyser, Sam. “Does the Effectiveness of CCTV as a Crime Prevention Strategy Outweigh the Threat
to Civil Liberties?” The Police Journal 77, no 2 (2004): 120-134.
Prasad, Monika. “International Capital on “Silicon Plateau”: Work and Control in India’s Computer
Industry.” Social Forces 77, no. 2 (1998): 429-452.
Premeaux, Sonya Fontenot and Arthur G. Bedeian. “Breaking the Silence: The Moderating Effects
of Self-Monitoring in Predicting Speaking Up in the Workplace.” Journal of Management
Studies 40, no. 6 (2003): 1537-1562.
Price, Blaine A., Karim Adam and Bashar Nuseibeh. “Keeping Ubiquitous Computing to Yourself:
A Practical Model for User Control of Privacy.” International Journal of Human-Computer
Studies, 63, nos. 1-2 (2005): 228–253.
Rachels, James. “Why Privacy is Important.” Philosophy and Public Affairs 4, no. 4 (1975): 323-
333.
Radin, Tara J. and Patricia H. Werhane. “Employment-at-Will, Employee Rights, and Future
Directions for Employment.” Business Ethics Quarterly 13, no. 2 (2003): 113-130.
Rafiki, Ahmad and Kalsom Abdul Wahab. “Islamic Values and Principles in the Organization: A
Review of Literature.” Asian Social Science 10, no. 9 (2014): 1-7.
Rajak, Manish Prasad. “Ancient Indian Wisdom in Modern Management: A Review of its Scope and
Prospects.” aWEshkar 18, no. 2 (2014): 18-29.
Ramachandran, Kavil and Sudhir Voleti. “Business Process Outsourcing (BPO): Emerging Scenario
and Strategic Options for IT-enables Services.” Vikalpa 29, no. 1 (2004): 49-62.
Ramesh, Babu P. “‘Cyber Coolies’ in BPO: Insecurities and Vulnerabilities of Non-Standard Work.”
Economic and Political Weekly 39, no.5 (2004): 492-497.
Rana, Muhammad Habib and Muhammad Shaukat Malik. “Human Resource Management from an
Islamic Perspective: A Contemporary Literature Review.” International Journal of Islamic and
Middle Eastern Finance and Management 9, no. 1 (2016): 109-124.
Rana, Sudha, Raj Kumar, Sarwat Sultana and Rakesh Kumar Sharma. “Radiation-Induced
Biomarkers for the Detection and Assessment of Absorbed Radiation Doses.” Journal of
Pharmacy and Bioallied Sciences 2, no.3 (2010): 189-196.
Raven, Bertram H. “The Basis of Power: Origins and Recent Developments.” Journal of Social
Issues 49 (1993): 227-251.
Bibliography
lvii
Rawlins, Brad L. “Give the Emperor a Mirror: Toward Developing a Stakeholder Measurement of
Organizational Transparency.” Journal of Public Research 21, no. 1 (2009): 71-99.
_________. “Measuring the Relationship between Organizational Transparency and Employee
Trust.” Public Relations Journal 2, no. 2 (2008): 1-21.
Rawls, John. “Justice as Fairness: Political not Metaphysical.” Philosophy and Public Affairs 14
(1985): 223-251.
Razimi, Mohd Shahril Bin Ahmad, Murshidi Mohd Noor and Norzaidi Mohd Daud. “The Concept
of Dimension in Human Resource Management from Islamic Management Perspective.”
Middle-East Journal of Scientific Research 20, no. 9 (2014): 1175-1182.
Regan, Priscilla M. “Privacy as a Common Good in the Digital World.” Information, Communication
and Society 5, no. 3 (2002), 382-405.
Renato, Bellu and Fiume Peter. “Religiosity and Entrepreneurial Behaviour: An Exploratory Study.”
International Journal of Entrepreneurship and Innovation 5, no. 3 (2004): 191- 201.
Richards, Neil M. “The Dangers of Surveillance.” Harvard Law Review 126 (2013): 1934-1965.
Richardson, John T. E. “The Concepts and Methods of Phenomenographic Research.” Review of
Educational Research 69, no. 1 (1999): 53-82.
Riedy, Martin K. and Joseph H. Wen. “Electronic surveillance of Internet Access in the American
Workplace.” Information and Communication Technology Law 19, no. 1 (2010): 87-99.
Robinson, Sandra L. and Rebecca J. Bennett. “A Typology of Deviant Workplace Behaviours: A
Multidimensional Scaling Study.” The Academy of Management Journal 38, no. 2 (1995): 555-
572.
Rodgers, Gerry. “Labour Market Flexibility and Decent Work.” DESA Working Paper No. 47.
Department of Economic and Social affairs, (2007): 1-9.
Rosenberg, Kendra. “Location Surveillance by GPS: Balancing Employer’s Business Interest with
Employee Privacy.” Washington Journal of Law, Technology & Arts 6, no. 2 (2008): 145-154.
Rosenblat, Alex, Tamra Kneese and Danah Boyd. “Workplace Surveillance.” Data & Society
Working Paper, Prepared for Future of Work Project, Data & Society Research Institute
(2014): 1-19.
Rothstein, Lawrence E. “Privacy or Dignity? Electronic Monitoring in the Workplace.” New York
Law School Journal of International and Comparative Law 19, no. 3 (2000): 379-412.
Rule, James and Peter Brantley. “Computerized Surveillance in the Workplace: Forms and
Distributions Source.” Sociological Forum 7 no. 3 (1992): 405-423.
Rule, James B., Douglas McAdam, Linda Stearns and David Uglow. “Documentary Identification
and Mass Surveillance in the United States.” Social Problems 31, no 2 (1983): 222-234.
Bibliography
lviii
Sanders, Donald E., John K. Ross and Patricia Pattison. “Electronic Snoops, Spies, and Supervisory
Surveillance in the Workplace.” Southern Law Journal 23 (2013): 1-27.
Sanderson, M. “Big Brother’s Day at the Office.” Computer Fraud and Security 12, (2000): 9-11.
Sarpong, Sam and Donna Rees. “Assessing the Effects of “Big Brother” in a Workplace: The Case
of WAST.” European Management Journal 32 (2014): 216-222.
Savaneviciene, Asta and Zivile Stankeviciute. “Smart Power as A Pathway for Employing
Sustainable Human Resource Management.” Inzinerine Ekonomika-Engineering Economics
28, no. 2 (2017): 198-206.
Schnedler, Wendelin and Radovan Vadovic. “Legitimacy of Control.” Journal of Economics &
Management Strategy, 20, no. 4 (2011): 985–1009.
Schwartz, Mark S. “Universal Moral Values for Corporate Codes of Ethics.” Journal of Business
Ethics 59 (2005): 27-44.
Schwartz, Shalom H. “Are There Universal Aspects in the Structure and Contents of Human
Values?” Social Issues 50, no. 4 (1994): 19-45.
_________. “Universals in the Content and Structure of Values: Theoretical Advances and Empirical
Tests in 20 Countries.” Advances in Experimental Social Psychology 25 (1992): 1-65.
Scott, John. “Social Class and Stratification in Late Modernity.” Acta Sociologica 45, no. 1 (2002):
23-35.
Selmi, Michael. “Privacy for the Working Class: Public Work and Private Lives.” Louisiana Law
Review 66, no. 4 (2006): 1035, 1042-1049.
Sempill, Julian. “Under the Lens: Electronic Workplace Surveillance.” Australian Journal of Labour
Law 14, no.2 (2001):111-144.
Sen, Amartya. “Human Rights and Capabilities.” Journal of Human Development 6, no. 2 (2005):
151-166.
_________. “Well-being, Agency and Freedom: The Dewey Lectures 1984.” The Journal of
Philosophy 82, no. 4 (1985): 169-221.
Sewell, Graham and Barry Wilkinson. “Someone to Watch Over Me: Surveillance, Discipline and
the Just-in-Time Labour Process.” Sociology 26 (1992b): 271-289.
Sewell, Graham and James R. Barker. “Coercion versus Care: Using Irony to Make Sense of
Organizational Surveillance.” The Academy of Management Review, 31 no. 4 (2006): 934-961.
_________. “Neither Good nor Bad, but Dangerous: Surveillance as an Ethical Paradox.” Ethics and
Information Technology 3 (2001): 183-196.
Bibliography
lix
Sewell, Graham, James R. Barker and Daniel Nyberg. “Working Under Intensive Surveillance:
When Does ‘Measuring Everything that Moves’ Become Intolerable?” Human Relations 65,
no. 2 (2012): 189-215.
Sewell, Graham. “Nice Work? Rethinking Managerial Control in an Era of Knowledge Work.”
Organization 12, no. 5 (2005): 685-704.
Shahid, Amena and Shahid M. Azhar. “Integrity and Trust: The Defining Principles of Great
Workplace.” Journal of Management Research 5, no. 4 (2013): 64-75.
Sharma, Sanjeev K. and Aditi Sharma, “Examining the Relationship between Organizational Culture
and Leadership Styles.” Journal of the Indian Academy of Applied Psychology 36, no. 1 (2010):
97-105.
Shaw, Jason D., John E. Delery, G. Douglas Jenkins Jr., and Nina Gupta. “An Organization-Level
Analysis of Voluntary and Involuntary Turnover.” Academy of Management Journal 41, no. 5
(1998): 511-525.
Shrestha, Binod Krishna. “Religious Ethics and Socially Responsible Behaviours of Small Firms in
Nepal.” Journal of Religion and Business Ethics 3, no. 2 (2017): 1-16.
Siegle, Del. “Cyberbullying and Sexting: Technology Abuses of the 21st Century.” Gifted Child
Today 33, no. 2 (2010): 14-65.
Simola, Sheldene. “Ethics of Justice and Care in Corporate Crisis Management.” Journal of Business
Ethics 46, no. 4 (2003): 351-361.
Simpson, Ken and Marta Byrski. “The 21st Century Workplace: How Personal Technologies Can
Make a Difference.” Asia Pacific Journal of Business and Management 1, no. 2 (2010): 20-30.
Singh, Bharti. “Is the Service-Led Growth of India Sustainable?” International Journal of Trade,
Economics and Finance 3, no. 4 (2012): 316-322.
Singh, Gurinder and Inderpreet Singh Ahuja. “An Evaluation of Just-in-Time Initiatives in the Indian
Industries.” International Journal of Quality & Reliability Management 32, no. 6 (2015): 559-
588.
Singh, Jagdip. “Performance Productivity and Quality of Frontline Employees in Service
Organizations.” Journal of Marketing 64, no. 2 (2000): 15-34.
Singh, Nirvikar. “Technology and India’s Economic Development.” UC Santa Cruz Economics
Working Paper No. 523 (2002): 1-32.
Singh, Sultan and Dixit Garg. “JIT System: Concepts, Benefits and Motivation in Indian Industries.”
International Journal of Management and Business Studies 1, no. 1 (2011): 26-30.
Singh, Vishalashi. “An Analysis of Personal Data Protection with Special Emphasis on Current
Amendments and Privacy Bill.” International Journal of Law and Legal Jurisprudence Studies
4, no. 1 (2017): 144-152.
Bibliography
lx
Sinha, Jai B.P. and R.N. Kanungo. “Context Sensitivity and Balancing in Organizational Behaviour.”
International Journal of Psychology 32, no. 2 (1997): 93-106.
Sipior, Janice C., Burke T. Ward and Sebastian M. Rainone. “Ethical Management of Employee
Email Privacy.” Information Systems Management 15, no. 1 (1998): 41-47.
Sison, Alejo José G. and Joan Fontrodona. “The Common Good of the Firm in the Aristotelian-
Thomistic Tradition.” Business Ethics Quarterly 22, no. 2 (2012): 211-246.
Sison, Alejo José G., Ignacio Ferrero and Gregorio Guitián. “Human Dignity and the Dignity of
Work: Insights from Catholic Social Teaching.” Business Ethics Quarterly 26, no. 4 (2016):
503-528.
Siu, Noel Y. M, John R. Dickinson and Betsy Y. Y. Lee. “Ethical Evaluations of Business Activities
and Personal Religiousness.” Teaching Business Ethics 4, no. 3 (2000): 233-256.
Smith, Jonathan A. “Beyond the Divide between Cognition and Discourse: Using Interpretative
Phenomenological Analysis in Health Psychology.” Psychology and Health 11, no. 2 (1996):
261-271.
_________. “Beyond the Divide Between Cognition and Discourse: Using Interpretative Sofaer,
Shoshanna. “Qualitative Research Methods.” International Journal for Quality in Health Care
14, no. 4 (2002): 329-336.
Smith, Michael J., Pascale Carayon, K. J. Sanders, S Y Lim and David LeGrande. “Employee Stress
and Health Complaints in Jobs with and Without Electronic Performance Monitoring.” Applied
Ergonomics 23, no. 1 (1992): 17-27.
Smith, Patricia L. and Ellwood F. Oakley. “The Value of Ethics Education in Business School
Curriculum.” College Student Journal 30 (1996): 274-283.
Snyder, Mark. “Self-Monitoring of Expressive Behaviour.” Journal of Personality and Social
Psychology 30, no. 4 (1974): 526-537.
Solomon, Robert C. “The Corporation as Community. A Reply to Ed Hartmann.” Business Ethics
Quarterly 4, no. 3 (1994): 271-285.
_________. “The Moral Psychology of Business: Care and Compassion in the Corporation.”
Business Ethics Quarterly 8, no. 3, (1998): 515-533.
Solove, Daniel J. and Danielle Keats Citron. “Risk and Anxiety: A Theory of Data-Breach Harms.”
Texas Law Review 96 (2018): 737-786.
Solove, Daniel J. “Introduction: Privacy Self-Management and the Consent Dilemma.” Harvard Law
Review 126, no. 7 (2013): 1880-1903.
_________. “A Taxonomy of Privacy.” University of Pennsylvania Law Review 154, no. 3 (2006):
477-564.
Bibliography
lxi
_________. “I’ve Got Nothing to Hide and Other Misunderstandings of Privacy.” San Diego Law
Review 44 (2007): 745-772.
_________. “Reconstructing Electronic Surveillance Law.” The George Washington Law Review 72
(2004): 1701-1747.
Spitzeck, Heiko. “An Integrated Model of Humanistic Management.” Journal of Business Ethics 99,
no. 1 (2011): 51-62.
Spitzmüller, Christiane and Jeffrey M. Stanton. “Examining Employee Compliance with
Organizational Surveillance and Monitoring.” Journal of Occupational and Organizational
Psychology 79 (2006): 245-272.
Stanton, J.M. and E. M. Weiss. “Electronic Monitoring in Their Own Words: An Explanatory Study
of Employee’s Experiences with New Types of Surveillance.” Computers in Human Behaviour
16, no. 4 (2000): 423-440.
Stanton, Jeffrey M. “Reactions to Employee Performance Monitoring: Framework, Review, and
Research Directions.” Human Performance 13, no, 1 (2000): 85-113.
_________. “Traditional and Electronic Monitoring from an Organizational Justice Perspective.”
Journal of Business and Psychology 15, no. 1 (2000): 129-147.
Stanton, Jeffrey M. and Amanda L. Julian. “The Impact of Electronic Monitoring on Quality and
Quantity of Performance.” Computers in Human Behaviour 18 (2002): 85-101.
Starr, Paul. “The Meaning of Privatization.” Yale Law & Policy Review 6, no.1 (1988): 6-41.
Stephen, Brammer, Williams Geoffrey and Zinkin John. “Religion and Attitudes to Corporate Social
Responsibility in a Large Cross-Country Sample.” Journal of Business Ethics 7, no. 1 (2007):
229-243.
Stephen, Tina K. and Arun Sasi. “Analysis of Potential Legal Strategies for Mitigation of Workplace
Bullying in India.” Management and Labour Studies 42, no. 1 (2017): 20-38.
Stichel, Ellen Van. “Love and Justice’s Dialectical Relationship: Ricoeur’s Contribution on the
Relationship between Care and Justice within Care Ethics.” Medicine Health Care and
Philosophy 17, no. 4 (2014): 499-508.
Strauss, Bernd. “Social Facilitation in Motor Tasks: A Review of Research and Theory.” Psychology
of Sport and Exercise 3, no. 3 (2002): 237-256.
Subhavadee, Numkanison. “Business and Buddhist Ethics.” The Chulalongkorn Journal of Buddhist
Studies 1, no. 1 (2002): 39-58.
Suda, Yohei. “Monitoring E-mail of Employees in the Private Sector: A Comparison Between
Western Europe and the United States.” Washington University Global Studies Law Review 4,
no. 2 (2005): 209-262.
Bibliography
lxii
Sundar, K.R. Shyam. “Trade Unions and the New Challenges: One Step Forward and Two Steps
Backward.” The Indian journal of Labour Economics 49, no. 4 (2006): 903-918.
Susser, Peter A. “Electronic Monitoring in the Private Sector: How Closely Should Employers
Supervise Their Workers?” Employee Relations 13 (1988): 575-598.
Sygnatur, Eric F. and Guy A. Toscano. “Work-Related Homicides: The Facts.” Compensation and
Working Conditions 2 (2000): 3-8.
Tablan, Ferdinand. “Catholic Social Teachings: Toward a Meaningful Work.” Journal of Business
Ethics 128 no. 2 (2015): 291-303.
Taskin, Laurent and Velérie Devos. “Paradoxes from the Individualization of Human Resource
Management: The Case of Telework.” Journal of Business Ethics 62, no. 1 (2005): 13–24.
Tavani, Herman T. “Philosophical Theories of Privacy: Implications for an Adequate Online Privacy
Policy,” Metaphilosophy 38, no. 1 (2007): 1-22.
Tavani, Herman T. and James H. Moor. “Privacy Protection, Control of Information, and Privacy-
Enhancing Technologies.” Computers and Society 31, no. 1 (2001): 6-11.
Taylor, Phil and Peter Bain. “‘India Calling to the Far Away Towns’: The Call Centre Labour Process
and Globalization.” Work, Employment and Society 19, no. 2 (2005): 261-282.
_________. “An Assembly Line in the Head: Work and Employee Relations in the Call Centre.”
Industrial Relations Journal 30, no. 2 (2003): 101-117.
_________. “Call Centre Offshoring to India: The Revenge of History?” Labour and Industry 14,
no. 3 (2004): 15-33.
Taylor, Phil, Gareth Mulvey, Jeff Hyman and Peter Bain. “Work Organization, Control and the
Experience of Work in Call Centres.” Work, Employment, and Society 16, no. 1 (2002): 133-
150.
Taylor, Philip and Peter Bain. “Trade Unions, Workers’ Rights and the Frontier of Control in UK
Call Centres.” Economic and Industrial Democracy 22 (2001): 39-66.
Taylor, Tom R. “Legitimacy and Criminal Justice: The Benefits of Self-Regulation.” Ohio State
Journal of Criminal Law 7 (2009): 307-359.
Terpstra, David E., Elizabeth J. Rozell and Robert K. Robinson. “The Influence of Personality and
Demographic Variables on Ethical Decisions Related to Insider Trading.” The Journal of
Psychology 127, no. 4 (1993): 375-89.
Thamhain, Hans J. and David L. Wilemon. “Building High Performing Engineering Project Teams.”
IEEE Transactions on Engineering Management 34, no. 3 (1987): 130-137.
Thomas, Jayan Jose. “Explaining the ‘Jobless’ Growth in Indian Manufacturing.” Journal of the Asia
Pacific Economy 18, no. 4 (2013): 673-692.
Bibliography
lxiii
Thomson, Judith Jarvis. “The Right to Privacy.” Philosophy and Public Affairs 4, no. 4 (1975): 295-
314.
Tilley, Nick. “Whys and Wherefores in Evaluating the Effectiveness of CCTV.” International
Journal of Risk, Security and Crime Prevention 2, no. 3 (1997): 175-185.
Todd, Patricia, Joan Eveline, Leonie Still and Judy Skene. “Management Responses to Unions in
Australian Call Centres: Exclude, Tolerate or Embrace?” Australian Bulletin of Labour 29, no.
2 (2003): 162-176.
Townsend, K. “Electronic Surveillance and Cohesive Teams: Room for Resistance in an Australian
Call Center.” New Technology, Work and Employment 20, no. 1(2005): 47–59.
Trethewey, Angela. “Disciplined Bodies: Women’s Embodied Identities at Work.” Organization
Studies 20, no. 3 (1999): 423-450.
Troullinou, Pinelopi. “Rethinking Privacy and Freedom of Expression in the Digital Era: An
Interview with Mark Andrejevic.” Westminster Papers in Communication and Culture 12, no.
3 (2017): 72-77.
Tschannen-Moran, Megan, and Wayne K. Hoy. “A Multidisciplinary Analysis of the Nature,
Meaning, and Measurement of Trust.” Review of Educational Research 70, no. 4 (2000): 547-
593.
Tyler, Tom R. and Steven L. Blader. “Can Business Effectively Regulate Employee Conduct? The
Antecedents of Rule Following in Work Settings.” Academy of Management Journal 48, no. 6
(2005): 1143-1158.
_________. “The Group Engagement Model: Procedural Justice, Social Identity, and Cooperative
Behaviour.” Personality and Social Psychology Review 7, no. 4 (2003): 349-361.
Tyler, Tom R., Lawrence Sherman, Heather Strang, Geoffrey C. Barnes, and Daniel Woods.
“Reintegrative Shaming, Procedural Justice, and Recidivism: The Engagement of Offenders’
Psychological Mechanisms in the Canberra RISE Drinking-and-Driving Experiment.” Law and
Society Review 41, 3 (2007): 553-586.
U.S. Congress, Office of Technology Assessment. “The Electronic Supervisor: New Technology,
New Tensions.” OTA-CIT-333. Washington, DC: U.S. Government Printing Office, 1987, 50-
54.
Ugrin, Joseph C., J. Michael Pearson and Marcus D. Odom. “Profiling Cyber-Slackers in the
Workplace: Demographic, Cultural, and Workplace Factors.” Journal of Internet Commerce
6, no. 3 (2007): 75-89.
Ularu, Elena Geanina, Florina Camelia Puican, Anca Apostu and Manole Velicanu. “Perspective on
Big Data and Big Data Analytics.” Database Systems Journal 3, no. 4 (2012): 3-14.
Unni, Jeemol and Uma Rani. “Globalization, Information Technology Revolution and Service Sector
in India.” Indian Journal of Labour Economics 43, no. 4 (2000): 803-828.
Bibliography
lxiv
Upadhya, Carol. “Controlling Offshore Knowledge Workers: Power and Agency in India’s Software
Outsourcing industry.” New Technology, Work and Employment 24, no. 1 (2009): 2-18.
Valsecchi, R. “Visible Moves and Invisible Bodies: The Case of Teleworking in an Italian Call
Centre.” New Technology, Work and Employment 21, no. 2 (2006): 123-138.
Van den Broek, Diane. “We have the Values: Customers, Control and Corporate Ideology in Call
Centre Operations.” New Technology, Work and Employment 19, no. 1 (2004): 2-13.
Van Luijk, Henk. “Rights and Interests in a Participatory Market Society.” Business Ethics Quarterly
4, no. 1 (1994): 79-96.
Värlander, Sara. “Individual Flexibility in the Workplace: A Spatial Perspective.” The Journal of
Applied Behavioural Science 48, no. 1 (2012): 33-61.
Venkatapathy R. and Madhumathi M. “Use of Technology and Counterproductive Work Behaviour.”
Paripex: Indian Journal of Research 5, no. 4 (2016): 55-57.
Verstraeten, Johan. “From Business Ethics to the Vocation of Business Leaders to Humanize the
World of Business.” A European Review 7, no. 2 (1998): 111-124.
_________. “How Faith Makes a Difference: Business as a Calling or the Christians in Business.”
Estudios Empresariales 113 (2003/3): 56-68.
_________. “Narrativity and Hermeneutics in Applied Ethics: Some Introductory Considerations.”
Ethical Perspectives 1, no.1 (1994): 51-56.
Vickers, John and George Yarrow. “Economic Perspectives on Privatization.” Journal of Economic
Perspectives 5, no. 2 (1992): 111-132.
Vihari, Nitin Simha and M.K. Rao. “Antecedents and Consequences of Sustainable Human Resource
Management: Empirical Evidence from India.” Jindal Journal of Business Research 7, no. 1
(2018): 61-85.
Vijayasri, G.V. “The Role of Information Technology (IT) Industry in India.” International Monthly
Refereed Journal of Research in Management & Technology 2 (2013): 54-64.
Vitell, Scott J. “The Role of Religiosity in Business and Consumer Ethics: A Review of the
Literature.” Journal of Business Ethics 90, no. 2 (2009): 155-167.
Von Siemens, Ferdinand A. “Intention-Based Reciprocity and the Hidden Costs of Control.” Journal
of Economic Behaviour & Organization 92 (2013): 55–65.
Waddock, Sandra. “Creating Corporate Accountability: Foundational Principles to Make Corporate
Citizenship Real.” Journal of Business Ethics 50, no. 4 (2004), 313–327.
_________. “The Development of Corporate Responsibility/Corporate Citizenship.” Organization
Management Journal 5, no. 1 (2008): 29-39.
Bibliography
lxv
Walton, Richard E. “Improving the Quality of Work Life.” Harvard Business Review 52, no. 3
(1974), 12-155.
Warmington, Paul. “From ‘Activity’ to ‘Labour’: Commodification, Labour Power and
Contradiction in Engeström’s Activity Theory.” Outlines. Critical Practice Studies 10, no. 2
(2008): 4-19.
Warner, Richard and Robert Sloan. “Beyond Notice and Choice: Privacy, Norms, and Consent.”
Journal of High Technology Law (2013): 1-34.
Watson, N. “The Private Workplace and the Proposed “Notice of Electronic Monitoring Act”: Is
“Notice” Enough?” Federal Communications Law Journal 54, no. 1(2001): 79-104.
Weaver, Gary R. “Corporate Codes of Ethics: Purpose, Process and Content Issues.” Business and
Society 32, no. 1 (1993): 44-58.
Weaver, Gary R. and Bradley R. Agle. “Religiosity and Ethical Behaviour in Organizations: A
Symbolic Interactionist Perspective.” Academy of Management Review 27, no. 1 (2002): 77-
97.
Webb, Janette. “Vocabularies of Motive and the ‘New’ Management.” Work, Employment, and
Society 10 (1996): 251-271.
Wen, H. Joseph, and Pamela Gershuny. “Computer based Monitoring the American Workplace:
Surveillance Technologies and Legal Challenges.” Human Systems Management 24, no.2,
(2005): 165-173.
West, Jonathan P. and James S. Bowman. “Electronic Surveillance at Work: An Ethical Analysis.”
Administration & Society 48, no. 5 (2016): 628-651.
Westin, A.F. “Two Key Factors That Belong in a Macroergonomic Analysis of Electronic
Monitoring: Employee Perceptions of Fairness and the Climate of Organizational Trust or
Distrust.” Applied Ergonomics 23, no. 1 (1992): 35-42.
Whetstone, J. Thomas. “How Virtue Fits within Business Ethics.” Journal of Business Ethics 33
(2001): 101-114.
_________. “Personalism and Moral Leadership: The Servant Leader with a Transforming Vision.”
Business Ethics: A European Review 11, no. 4 (2002): 385-392.
White, Andrew, Basak Yakis-Douglas, Heli Helanummi-Cole and Marc Ventresca. “Purpose-Led
Organization: “Saint Antony” Reflects on the Idea of Organizational Purpose, in Principle and
Practice.” Journal of Management Inquiry 26, no. 1 (2017): 101-107.
Whitty, Monica T. “Should Filtering Software Be Utilized in the Workplace? Australian Employees’
Attitudes towards Internet Usage and Surveillance of the Internet in the Workplace.”
Surveillance and Society 2, no. 1 (2004): 39-54.
Wilborn, S. Elizabeth. “Revisiting the Public/Private Distinction: Employee Monitoring in the
Workplace.” Georgia Law Review 32 (1998): 825-887.
Bibliography
lxvi
Williams, Thomas D. “What is Thomistic Personalism?” Alpha Omega 7, no. 2 (2004): 163-197.
Winiecki, Donald J. “Shadowboxing with Data: Production of the Subject in Contemporary Call
Centre Organizations.” New Technology, Work and Employment 19, no. 2 (2004): 78-95.
Wittmer, Dennis and Kevin O’Brien. “The Virtue of “Virtue Ethics” in Business and Business
Education.” Journal of Business Ethics Education 11 (2014): 1-18.
Wood, David Murakami and C. William R. Webster. “Living in Surveillance Societies: The
Normalisation of Surveillance in Europe and the Threat of Britain’s Bad Example.” Journal of
Contemporary European Research 5, no. 2 (2009): 259-273.
Wood, Donna J. and Jeanne Logsdon. “Business Citizenship: From Individuals to Organizations.”
Ethics and Entrepreneurship 3 (2002): 59-94.
Worsnop, Richard L. “Privacy in the Workplace: Does Electronic Monitoring Violate Workers’
Privacy?” CQ Researcher 3, no. 43 (1993): 1009-1032.
Wright, David et al. “Questioning Surveillance.” Computer Law & Security Review 31, no. 2 (2015):
280-292.
Wright, David, Rowena Rodrigues and Charles D. Raab. “Questioning Surveillance.” Computer Law
& Security Review 31 (2015): 280-292.
Wright, Karen Shields. “The Principles of Catholic Social Teaching: A Guide for Decision Making
from Daily Clinical Encounters to National Policy-Making.” The Linacre Quarterly 84, no. 1
(2017): 10-22.
Yates, Christine, Helen Partridge and Christine Bruce. “Exploring Information Experiences through
Phenomenography.” Library and Information Research 36, no. 112 (2012): 96-119.
Yerby, Johnathan. “Legal and Ethical Issues of Employee Monitoring.” Online Journal of Applied
Knowledge Management 1, no. 2 (2013): 44-55.
Zajonc, Robert B. “Social Facilitation.” Science 149, no. 3681 (1965): 269-274.
Zecha, Gerhard. “The Golden Rule in Applied Ethics: How to Make Right Decisions in Theory and
Practice.” Anuarul Institutului de Istorie “George Baritiu” din Cluj-Napoca - Seria
HUMANISTICA 9 (2011): 89-100.
Zhu, Yanhan. “Individual Behaviour: In-Role and Extra-Role.” International Journal of Business
Administration 4, no. 1 (2013): 23-27.
Zuboff, Shoshana. “Big Other: Surveillance Capitalism and the Prospects of an Information
Civilization.” Journal of Information Technology 30 (2015): 75-89.
Zupan, Mark A. “The Virtues of Free Markets.” Cato Journal 31, no. 2 (2011): 171-198.
Bibliography
lxvii
Zweig, David and Jane Webster. “Where is the Line between Benign and Invasive? An Examination
of Psychological Barriers to the Acceptance of Awareness Monitoring Systems.” Journal of
Organizational Behaviour 23, no. 5 (2002): 605-633.
C. Book Sections & Conference Proceedings
Adebisi, Moses Adesola. “Trade Union Leadership Structure and the Challenges of Succession
Politics.” Paper presented at the International Industrial Relations African Regional Congress,
University of Lagos, Lagos, January 24-28, 2011.
Alge, Bradley J and S. Duane Hansen. “Workplace Monitoring and Surveillance since “1984”: A
Review and Agenda.” In The Psychology of Workplace Technology, eds. M.D. Coovert and L.
Foster Thompson, 209-237. New-York & London: Routledge, 2014.
Aneesh, A. “Rethinking Migration: On-Line Labour Flows from India to the United States.” In The
International Migration of the Highly Skilled, eds. W.A. Cornelius, T.J. Espenshade and I.
Salehyan, 351-370. San Diego: La Jolla Center for Comparative Immigration Studies,
University of California, 2001.
Arora, Dayanand. “Foreign Multinationals in India: Adopting to India’s Work Culture and
Management Practices.” In Internationale Geschäftstätigkeiten in Asien:
Länderkulturforschung anhand ausgewählter Länder, eds. Wilhelm Schmeisser, Thomas R.
Hummel, Gerfried Hannemann, and Dirk Ciupka, 149-179. München: Rainer Hampp Verlag,
2005.
Banaji, Jairus. “India: Workers’ Rights in a New Economic Order.” Workers’ Rights and Labour
Laws, A Backgrounder for the Workshop on Labour held from 29-31 December 2000 at the
National Conference on Human Rights, Social Movements, Globalization and the Law.
Mumbai: India Centre for Human Rights, 2000.
Bandari, Naveen Kumar and N. Uday Kumar. “Key Imperatives of Talent Management: The Indian
IT and ITES Industry Perspective.” In Managing Human Resource in Global Era – Prospects
& Challenges, ed. Ravi Aluvala, 111-118. Hyderabad: Zenon Academic Publishing, 2014.
Barling, Julian. “The Prediction, Experience, and Consequences of Workplace Violence.” In
Violence on the Job: Identifying Risks and Developing Solutions, eds. G. R. Vanden Bos and
E. Q. Bulatao, 29-51. Washington DC: American Psychological Association Press, 1996.
Barth, Adam, Anupam Datta, John C. Mitchell and Helen Nissenbaum. “Privacy and Contextual
Integrity: Framework and Applications.” SP ’06 Proceedings of the 2006 IEEE Symposium on
Security and Privacy (2006): 184-198.
Bhatia, Jaspreet and Travis D. Breaux. “A Data Purpose Case Study of Privacy Policies.”
Proceedings of the International Requirements Engineering Conference. IEEE Computer
Society, 2017, 394-399.
Batt, R., Doellgast, V., and Kwon, H. “Service Management and Employment Systems in U.S. and
Indian Call Centers.” In Brookings Trade Forum 2005: Offshoring White-Collar Work – the
Issues and Implications, eds. S. Collins and L. Brainard, 335-372. Washington, D.C.: The
Brookings Institution, 2005.
Bibliography
lxviii
Batt, Rosemary, Virginia Doellgast and Hyunji Kwon. “Employment Systems in Call Centres in the
United States and India.” In The Next Available Operator: Managing Human Resources in
Indian Business Process Outsourcing Industry, eds. Mohan Thitte and Bob Russell, 217-252.
Los Angeles: Response, 2009.
Baumeister, Roy F., Brandon J. Schmeichel and Kathleen D. Vohs. “Self-Regulation and the
Executive Function: The Self as Controlling Agent.” In Social Psychology: Handbook of Basic
Principles, eds. A. W. Kruglanski and E. T. Higgins, 516-539. New York: Guilford Press,
2007.
Benn, Stanley I. “Privacy, Freedom and Respect for Persons.” In Philosophical Dimensions of
Privacy: An Anthology, eds. Ferdinand David Schoeman, 223-244. Cambridge: Cambridge
University Press, 1984.
Biao, Xiang. “Indian Information Technology Professionals’ World System: The Nation and
Transnation in Individuals’ Migration Strategies.” In State/Nation/Transnation: Perspectives
on Transnationalism in the Asia-Pacific, eds. Brenda S. Yeoh and Katie Willis, 161-178.
London: Routledge, 2004.
Borman, W. C., and S. J. Motowidlo. “Expanding the Criterion Domain to Include Elements of
Contextual Performance.” In Personnel selection in organizations, eds. N. Schmitt, W. C.
Borman, and Associates, 71-98. San Francisco: Jossey-Bass, 1993.
Botan, Carl and Mihaela Vorvoreanu. “What Do Employees Think about Electronic Surveillance at
Work?” In Electronic Monitoring in the Workplace: Controversies and Solutions, ed. John
Weckert, 123-144. Hershey: Idea Group Publishing, 2005.
Bowden, John A. The Nature of Phenomenographic Research. In Phenomenography, eds. John A.
Bowden and Eleanor Walsh, 1-18. Melbourne, Australia: RMIT University, 2000a.
Brehm, Jack W. “Psychological Reactance: Theory and Applications.” In NA - Advances in
Consumer Research 16, eds. Thomas K. Srull and Provo, 72-75. UT: Association for Consumer
Research, 1989.
Brennan, Andrew and Y. S. Lo. “Two Conceptions of Dignity: Honour and Self-Determination.” In
Perspectives on Human Dignity: A Conversation, eds. Jeff Malapss and Norelle Lickiss, 43-
58. Dordrecht: Springer, 2007.
Brey, Philip. “Disclosive Computer Ethics.” In Readings in Cyber Ethics, eds. Richard A. Spinello
and Herman T. Tavani, 51-62. Sudbury, MA: Jones and Barlett, 2001.
_________. “The Importance of Workplace Privacy.” In The Ethics of Workplace Privacy, eds. Sven
Ove Hansson and Elin Palm, 97-118. Brussels: P.I.E.-Peter Lang, 2005.
Budhwar, Pawan S. and Neeru Malhotra. “Patterns of Work Processes and Emerging Problems in
Indian Call Centres.” In The Next Available Operator: Managing Human Resources in Indian
Call Centres/BPO Providers, eds. Mohan Thite and Bob Russell, 59–82. Delhi: Sage, 2008.
Budhwar, Pawan, Neeru Malhotra and Virender Singh. “Work Process and Emerging Problems in
Indian Call Centres.” In The Next Available Operator: Managing Human Resources in Indian
Bibliography
lxix
Business Process Outsourcing Industry, eds. Mohan Thitte and Bob Russell, 59-82. Los
Angeles: Response, 2009.
Bustard, John D. “Ethical Issues Surrounding the Asymmetric Nature of Workplace Monitoring.” In
Human Aspects of Information Security, Privacy and Trust, eds. Theo Tryfonas and Ioannis
Askoxylakis, 226-235. Berlin: Springer, 2013.
Case, Susan S. and J. Goosby Smith. “Contemporary Application of Traditional Wisdom: Using the
Torah, Bible, and Qur’an in Ethics Education.” In Handbook of Research on Teaching Ethics
in Business and Management Education, eds. Charles Wankel and Agata Stachowicz-Stanusch,
39-64. Hershey, PA: Information Science Reference, 2012.
Castle, Robert. “From Dangerousness to Risk.” In The Foucault Effect: Studies in Governmentality
with Two Lectures by and Interview with Michel Foucault, eds. G. Burchell, C. Gordon and P.
Miller, 281-298. Chicago: University of Chicago Press, 1991.
Chan, Peggie P.K. “Reporting Research Findings.” In Communicating in the University Culture, eds.
T. Ruanni F. Tupas, Catherine Cook and Norhayati Bte Mohd Ismail, 27-33. Singapore: NUS,
2009.
Chaturvedi, Atul. “Consolidated FDI Policy Circular of 2015.” Department of Industrial Policy &
Promotion, Ministry of Commerce & Industry. Government of India, D/o IPP F. No. 5(1)/2015-
FC-1, effect from 12 May 2015, 1-119,
http://dipp.nic.in/English/policies/FDI_Circular_2015.pdf [accessed February 10, 2016].
Chaudhry, Sunil et al. “Trade Unions in India 2010.” Report, Ministry of Labour & Employment,
Government of India. Chandigarh: Labour Bureau, 2010.
Ciulla, Joanne B. “Worthy Work and Bowie’s Kantian Theory of Meaningful Work.” In Kantian
Business Ethics: Critical Perspectives, eds. Dennis G. Arnold and Jered D. Harris, 115-131.
Northampton: Edward Edgar, 2012.
Clemmer, E.C. and B. Schneider. “Fair Service.” In Advances in Services Marketing and
Management, vol. 5, eds. S.W. Brown. D.A. Bowen, and T. Swartz, 109-126. Greenwich, CT:
JAI Press, 1996.
Coleman, Roy. “Surveillance and Social Ordering.” In Criminal Justice: Local and Global, eds.
Deborah Drake, John Muncie and Louse Westmarland, 141-176. Cullompton: Willan, 2010.
Dan-Cohen, Meir. “Introduction: Dignity and Its (Dis)content.” In Dignity, Rank, and Rights, ed.
Jeremy Waldron, 3-10. Oxford: Oxford University Press. 2012.
Danielson, Peter. “Ethics of Workplace Surveillance Games.” In Elelctronic Monitoring in the
Workplace: Controversies and solutions, ed. John Weckert, 19-34. Hershey: Idea Group
Publishing, 2005.
Davis, Louis E. “Design of New Organizations.” In The Quality of Working Life and the 1980s, eds.
Harvey Kolodny and Hans van Beinum, 65-86. New York: Praeger, 1983.
Bibliography
lxx
Dee, Michael J. “The Use of CCTV to Police Young People in Public Spaces - A Case of Big Brother
or Big Friend?” Paper presented at the 27th International Conference on Making Cities Livable,
Vienna, Austria. De Montfrot University, Youth and Community Division, Scraptoft Campus,
Leicester, LE7 9SU, U.K., 2000.
Dierksmeier, Claus. “Reorienting Management Education: From Homo Oeconomicus to Human
Dignity.” In Business Schools Under Fire: Humanistic Management Education as the Way
Forward, eds. Wolfgang Amann Michael Pirson, Claus Dierkmeier, Ernst von Kimakowitz,
and Heiko Spitzeck, 19-40. New York: Palgrave Macmillan, 2011.
Dodd Carley H. and Matthew J. Dodd. “What is Integrity?” In Business and Corporate Integrity:
Sustaining Organizational Compliance, Ethics, and Trust, eds. Robert C. Chandler, 3-13.
California: ABC-CLIO, LLC, 2014.
Doyle, Charles. “Privacy: An Overview of the Electronic Communications Privacy Act.” CRS Report
for Congress, Congressional Research Service, 1-91, 2012.
Edwards, Patricia K. “Patterns of Conflict and Accommodation.” In Employment in Britain, ed.
Duncan Gallie, 187-217. Oxford: Blackwell, 1988.
Eileen M. Otis and Zheng Zhao, “Producing Invisibility.” In Invisible Labour: Hidden Work in the
Contemporary World, eds. Marion Crain, Winifred R. Poster and Miriam A. Cherry, 148-169.
California: University of California, 2016.
Einarsen, Stale, Helge Hoel, Dieter Zapf, and Cary L. Cooper. “The Concept of Bullying and
Harassment at Work: The European Tradition.” In Bullying and Harassment in the Workplace:
Developments in Theory, Research, and Practice, 2nd ed., eds. Stale Einarsen, Helge Hoel,
Dieter Zapf, and Cary L. Cooper, 3-28. London: Taylor & Francis, 2011.
Elgesiem, Dag. “Privacy, Respect for Persons, and Risk.” In Philosophical Perspectives on
Computer-Mediated Communication, eds. Charles Ess, 45-66. Albany: State University of
New York Press, 1996.
Ethical Trading Initiative. “Working with Trade Unions to Improve Working Conditions.” ETI
Member Briefing, London, 1-4, 2010.
Feinberg, Joel. “Autonomy.” In The Inner Citadel: Essays on Individual Autonomy, ed. John
Christman, 27-53. Vermont: Echo Point Books, 2014.
Forgó, Nikolaus, Stefanie Hänold and Benjamin Schütze. “The Principle of Purpose Limitation and
Big Data.” In New Technology, Big Data and the Law, eds. Marcelo Corrales, Mark Fenwick,
and Nikolaus Forgó, 17-42. Singapore: Springer, 2017.
Foucault, Michel. “Space, Knowledge, and Power.” In The Foucault Reader, ed. Paul Rabinow.
Harmondsworth: Penguin Books, 1984a.
_________. “On the Genealogy of Ethics: An Overview of Work in Process.” In The Foucault
Reader, ed. Paul Rabinow. Harmondsworth: Penguin Books, 1984b.
Bibliography
lxxi
Gagné, Marylène and Devasheesh Bhave. “Autonomy in the Workplace: An Essential Ingredient to
Employee Engagement and Well-Being in Every Culture.” In Human Autonomy in Cross-
Cultural Context, eds. Valery I. Chirkov, Richard M. Ryan, Kennon M. Sheldon, 163-187.
New York: Springer, 2011.
Galetta, Antonella and Paul de Hert. “Mapping the Legal and Administrative Frameworks in
Belgium, Deliverable D5: Exercising Democratic Rights under Surveillance Regimes,”
Belgium Country Reports, 1-48, 2014.
Gandy Jr, Oscar H. “Statistical Surveillance: Remote Sensing in the Digital Age.” In Routledge
Handbook of Surveillance Studies, eds. Kirstie Ball, Kevin D. Haggerty and David Lyon, 125-
132. Oxon: Routledge, 2014.
Gasparski, Wojciech W. “Beyond the Prose of Business.” In Spirituality and Ethics in Management,
ed. Zsolnai, László, 123-140. New York: Kluwer Academic Publishers, 2005.
Graham, Stephen and David Wood. “Digitizing Surveillance: Categorization, Space, Inequality.” In
The Surveillance Studies Reader, eds. Sean P. Hier and Josh Greenberg, 218-230. Berkshire,
England: McGraw-Hill, 2007.
Gumbert, Gary and Susan J. Drucker. “The Demise of Privacy in a Private World.” In Cyberethics:
Social and Moral Issues in the Computer Age, eds. R.M. Baird, R. Ramsower and S.E.
Rosenbaum, 171-197. New York: Prometheus Books, 2000.
Haga, Yuriko. “Right to be Forgotten: A new Privacy Right in the Era of Internet.” In New
Technology, Big Data and the Law, eds. Marcelo Corrales, Mark Fenwick and Nikolaus Forgó,
97-126. Singapore: Springer, 2017.
Haggerty, Kevin D. “Tear Down the Walls: On Demolishing the Panopticon.” In Theorizing
Surveillance: The Panopticon and Beyond, ed., David Lyon, 23-45. Cullompton: Willan
publishing, 2008.
Hancock, Beverley, Elizabeth Ockleford and Kate Windridge. “An Introduction to Qualitative
Research.” The NIHR RDS for the East Midlands / Yorkshire & The Humber 2009 Qualitative
Research. The NIHR RDS EM / YH, 1-39, 2009.
Hannif, Z. Nadiyah. “Job Quality in Call Centres: Key Issues, Insights and Gaps in the Literature.”
6th Global Conference on Business and Economics (GCBE) Proceedings, 1-13. Lynchburg
USA: Association for Business and Economics Research, 2006.
Heald, David. “Varieties of Transparency.” In Transparency: The Key to Better Governance, eds.
Christopher Hood and David Heald, 25-43. New York: Oxford University Press, 2006.
Heelas, Paul. “Work Ethics, the Soft Capitalism and the ‘Turn to Life.’” In Cultural Economy:
Cultural Analysis and Commercial Life, eds. Paul du Gay and Michael Pryke, 78-97. London:
Sage Publication, 2002.
Hert, Paul de and Mieke Loncke. “Camera Surveillance and Workplace Privacy in Belgium.” In
Reasonable Expectations of Privacy? Eleven Country Reports on Camera Surveillance and
Bibliography
lxxii
Workplace Privacy, eds. J. Nouwt, B. R., de Vries and R. J. W. Loermans, 167-209. Den
Hague: T.M.C. Asser Press, 2005.
Hier, Sean P. and Josh Greenberg. “Surveillance, the Nation-State and Social Control.” In The
Surveillance Studies Reader, eds. Sean P. Hier and Josh Greenberg, 11-17. Berkshire, England:
McGraw-Hill, 2007.
Hill, Peter C. and Gary S. Smith. “Coming to Terms with Spirituality and Religion in the Workplace.”
In Handbook of Workplace Spirituality and Organizational Performance, eds. Robert A.
Giacalone and Carole L. Jurkiewicz, 231-243. Armonk: M.E. Sharpe, 2003.
Hodgetts, Richard M. and Steven Altman. “History of Management Thought.” In Management
Handbook: Operating Guidelines, Techniques and Practices, ed. Paul Mali. New York: John
Wiley, 1981.
Hoeren, Thomas and Sonja Eustergerling. “Privacy and Data Protection at the Workplace in
Germany.” In Reasonable Expectations of Privacy: Eleven Country Reports on Camera
Surveillance and Workplace Privacy, eds. Sjaak Nouwt, Berend R. de Vries and Corien Prins,
211-244. The Hague, PA: TMC Asser Press, 2005.
Hollenbach, David. “Human Dignity in Catholic Thought.” In Cambridge Handbook on Human
Dignity: Interdisciplinary Perspectives, eds.
Marcus Düwell, Jens Braarvig, Roger Brownsword and Dietmar Mieth, 250–259. Cambridge,
UK: Cambridge University Press. 2014.
Holman, David. “Employee Well-Being in Call Centres.” In Call Centres and Human Resource
Management, eds. Stephen Deery and Nick Kinnie, 223-244. Basingstoke: Palgrave, 2004.
Hongladarom, Soraj. “Electronic Surveillance in the Workplace: A Buddhist Perspective.” In
Electronic Monitoring in the Workplace: Controversies and Solutions, ed. John Weckert, 208-
225. Hershey: Idea Group Publishing, 2005.
Hunt, Shelby D. and Scott J. Vitell. “The General Theory of Marketing Ethics: A Retrospective and
Revision.” In Ethics in Marketing, eds. N. Craig Smith and J. A. Quelch, 775-784. Homewood,
IL: Irwin Inc., 1993.
Indiparambil, Jijo James. “Deconstruction of Power: An Ethical Response to Organizational
Surveillance.” Conference Proceedings, The European Conference on Ethics, Religion &
Philosophy 2015, 75-87. Brighton: The International Academic Forum, 2015.
International Labour office. “Fundamental Principles and Rights at Work: From Commitment to
Action.” International Labour Conference, Session 101, 2012.
Jain, R.B. “Globalization, Liberalization and Human Welfare in India: Challenges for Governance.”
In Social Security and Welfare Policy, eds. M.M. Sankhadhar and Sharda Jain, 429-445. New
Delhi: Deep and Deep Publications, 2004.
Jenkins, Richard. “Identity, Surveillance and Modernity.” In Routledge Handbook of Surveillance
Studies, eds. Kirstie Ball, Kevin D. Haggerty and David Lyon, 159-166. Oxon: Routledge,
2014.
Bibliography
lxxiii
Johnson, Phil. “Analytic induction.” In Qualitative Methods and Analysis in Organizational
Research: A Practical Guide, eds. Gillian.Symon and Catherine Cassell, 28-50. London: Sage.
1998.
Jones, Edward E. and Thane S. Pittman. “Toward a General Theory of Strategic Self-Presentation.”
In Psychological Perspectives on the Self, vol.1, ed., Jerry Suis, 231-262. Hillsdale, NJ:
Lawrence Erlbaum Associates, 1982.
Karyda, Maria and Lilian Mitrou. “Bridging the Gap Between Employee Surveillance and Privacy
Protection.” In Social and Human Elements of Information Security: Emerging Trends and
Countermeasures, eds. Manish Gupta and Raj Sharman, 283-300. Hershey: IGI Global, 2008.
Khare, Anshuman. “Japanese and Indian Work Patterns: A Study of Contrasts.” In Management and
Cultural Values: The Indiginization of Organizations in Asia, eds. Henry S. R. Kao, Durganand
Sinha, and Bernhard Wilpert, 121-138. New Delhi: Sage Publications, 2002.
Kikeri, Sunita. “Privatization and Labour: What Happens to Workers When Governments Divest?”
World Bank Technical Paper, 396. Washington DC: The World Bank, 1997.
Kinnie, N., J. Purcell and S. Hutchinson. “Modelling HR Practices and Business Strategy in
Telephone Call Centres.” Paper presented to the Workshop on Call Centres, Center for
Economic Performance, London School of Economics, March 19, 1999.
Kizza, Joseph Migga and Jackline Ssanyu. “Workplace Surveillance.” In Electronic Monitoring in
the Workplace: Controversies and Solutions, eds. John Weckert, 1-18. Hershey, PA: Idea-
Group, 2005.
Koehn, Daryl. “Ethical Issues in Human Resources.” In The Blackwell Guide to Business Ethics, ed.
Norman E. Bowie, 225-243. Malden, MA: Blackwell, 2002.
Koskela, Hille. “You Shouldn’t Wear that Body: The Problematic of Surveillance and Gender.” In
Routledge Handbook of Surveillance Studies, eds. Kirstie Ball, Kevin D. Haggerty and David
Lyon, 49-56. Oxon: Routledge, 2014.
Köffer, Sebastian. “Designing the Digital Workplace of the Future – What Scholars Recommend to
Practitioners.” Thirty Sixth International Conference on Information Systems, Fort Worth,
2015, 1-21.
Krishnan, Sandeep K., Biju Varkkey and Anush Raghavan. “Employee Privacy at Workplaces: Some
Pertinent Issues.” Research and Publication Department (No. WP2006-02-04), Indian Institute
of Management Ahmedabad, 2006.
Krosnick, Jon A., Paul J. Lavrakas and Nuri Kim. “Survey Research.” In Handbook of Research
Methods in Social and Personality Psychology, 2nd ed., eds. Harry, T. Reis, Charles M. Judd,
404-443. New York: Cambridge University Press, 2014.
Kumaraguru, Ponnurangam and Lorrie Cranor. “Privacy in India: Attitudes and Awareness.” In
Privacy Enhancing Technologies, eds. George Danwzis and David Martin, 243-258. Berlin:
Springer, 2005.
Bibliography
lxxiv
Lankshear, G. and D. Mason. “Within the Panopticon? Surveillance, Privacy and the Social Relations
of Work in Two Call Centres.” Paper presented to the Work, Employment and Society
Conference, 11-13 September 2001.
LeBlanc, Manon Mireille and Julian Barling. “Understanding the Many Faces of Workplace
Violence.” In Counterproductive Workplace Behaviour: Investigations of Actors and Targets,
eds. Suzy Fox and Paul E. Spector, 41-63. Washington, DC: American Psychological
Association, 2005.
Leventhal, Gerald.S. “What should be Done with Equity Theory? New Approaches to the Study of
Fairness in Social Relationships.” In Social exchange: Advances in theory and research, eds.
K. Gergen, M. Greenberg, and R. Willis, 27-55. New York: Plenum Press, 1980.
Lippke, Richard L. “Work, Privacy, and Autonomy.” In Ethics in the Workplace, ed. Robert A.
Larmer. Minneapolis: West Publishing Company, 1996 [Earlier version in: Public Affairs
Quarterly 3, no.2 (1989): 41-55].
Lyon, David and Elia Zureik. “Surveillance, Privacy, and the New Technology.” In Computers,
Surveillance, and Privacy, eds. David Lyon and Elia Zureik, 1-18. Minneapolis: University of
Minnesota Press, 1996.
Lyon, David, Kevin D. Haggerty and Kirstie Ball. “Introducing Surveillance Studies.” In Routledge
Handbook of Surveillance Studies, eds. Kirstie Ball, Kevin D. Haggerty and David Lyon, 1-11.
Oxon: Routledge, 2014.
Lyon, David. “Everyday Surveillance: Personal Data and Social Classifications.” In The Surveillance
Studies Reader, eds. S. P. Hier and J. Greenberg, 136-146. New York: McGraw-Hill, 2007a.
_________. “Surveillance as Social Sorting: Computer Codes and Mobile Bodies.” In Surveillance
as Social Sorting: Privacy, Risk, and Digital Discrimination, ed. David Lyon, 13-32. London:
Routledge, 2003.
_________. “Surveillance Technology and Surveillance Society.” In Modernity and Technology,
eds. Thomas J. Misa, Philip Brey and Andrew Feenberg, 161-184. Cambridge: The MIT Press,
2003.
_________. “The Roots of the Information Society Idea.” In Information Technology and Society: A
Reader, eds. Nick Heap, Ray Thomas, Geoff Einon, Robin Mason, Hugh Mackay, 52–73.
London: Sage, 1995.
Maritain, Jacques. “Integral Humanism, Freedom in the Modern World, and a Letter on
Independence.” In The Collected Works of Jacques Maritain, eds. Otto Bird. Translated by
Otto Bird, Joseph Evans, and Richard O’Sullivan (Original: Integral Humanism: Temporal and
Spiritual Problems of a New Christendom, 1938). Notre Dame, IN: University of Notre Dame
Press, 1996.
Markussen, Randi. “Constructing Easiness – Historical Perspectives on Work, computerization, and
Women.” In The Cultures of Computing – Sociological Review Monograph, ed. Susan Leigh
Star, 158-180. Oxford: Blackwell, 1995.
Bibliography
lxxv
Marx, Gary T. “What’s New about the ‘New Surveillance’? Classifying for Change and Continuity,”
In The Surveillance Studies Reader, eds. Sean P. Hier and Josh Greenberg, 83-94. New York:
McGraw-Hill, 2007.
Mason, David, Graham Button, Gloria Lankshear and Sally Coetes. “Getting Real about Surveillance
and Privacy at Work.” In Virtual Society? Technology, Cyberbole, Reality, ed. Steve Woolger,
99-114. Oxford: Oxford University Press, 2002.
Mayer, John D. and Peter Salovey. “What is Emotional Intelligence?” In Emotional Development
and Emotional Intelligence: Educational Implications, eds. Peter Salovey and David J. Sluyter,
3-31. New York: Basic Books, 1997.
Mayhew, Claire and Michael Quinlan. “The Relationship between Precarious Employment and
Patterns of Occupational Violence: Survey Evidence from Thirteen Occupations.” In Health
Effects of the New Labour Market, eds. Kerstin Isaksson, Christer Hogstedt, Charli Eriksson,
and Töres Theorell, 183-205. New York: Kluwer Academic/Plenum Publishers, 2002.
McDonald, Gael M. and Raymond A. Zepp. “Business Ethics: Practical Proposals.” In Managing
Business Ethics, eds. John Drummond and Bill Bain, 196-210. Oxford: Butterworth-
Heinemann, 1996.
McKinlay, Alan and Phil Taylor. “Commitment and Conflict: Worker Resistance to HRM in the
Microelectronics Industry.” In The Handbook of Human Resource Management, 2nd ed., ed. B.
Towers, 467-487. Oxford: Blackwell, 1996.
Melé, Domènec. “Religious Foundations of Business Ethics.” In The Accountable Corporation, Vol.
2, eds. Mark J. Epstein and Kirk O. Hanson, 11-43. London: Praeger, 2006.
_________. “Three Key Concepts of Catholic Humanism for Economic Activity: Human Dignity,
Human Rights and Integral Human Development.” In Humanism in Economics and Business:
Perspectives of the Catholic Social Tradition, eds. Domènec Melé and Martin Schlag, 113-
136. Dordrecht: Springer, 2015.
_________. “Virtues, Values, and Principles in Catholic Social Teaching.” In Handbook of Virtue
Ethics in Business and Management, eds. Alejo José G. Sison, Gregory R. Beabout and
Ignacio Ferrero, 153-164. Dordecht: Springer, 2017.
Merleau-Ponty, Maurice. “Eye and Mind.” In The Primacy of Perception, eds. James E. Edie.
Translated by Carleton Dallery, 159–190. Evanston, IL: Northwestern University Press, 1964.
Meyers, Diana T. “Intersectional Identity and the Authentic self: Opposites attract!” In Relational
Autonomy: Feminist Perspectives on Autonomy, Agency and the Social Self, eds. Catriona A.
Mackenzie and Natalie Stoljar, 151-180. New York: Oxford University Press, 2000.
Miller, David and Timothy Ewest. “Rethinking the Impact of Religion on Business Values:
Understanding its Reemergence and Measuring its Manifestations.” In Dimensions of Teaching
Business Ethics in Asia, eds. Stephan Rothlin and Parissa Haghirian, 29-38. Berlin: Springer,
2013.
Bibliography
lxxvi
Miller, David and Michael J. Thate, “Are Business Ethics Relevant?” In Economics as a Moral
Science, eds. Peter Rona and Laszlo Zsolnai, 163-173. Switzerland: Springer, 2017.
Minsky, Marvin, Ray Kurzweil and Steve Mann. “The Society of Intelligent Veillance.”
International Symposium on Technology and Society (ISTAS), 13-17, 2013.
Mitcham, Carl, ed. “Management.” Encyclopedia of Science, Technology and Ethics, vol. 3, 1150-
1155. Detroit: Thomson & Gale, 2005.
Moka-Mubelo, Willy. “Human Rights and Human Dignity.” In Reconciling Law and Morality in
Human Rights Discourse: Beyond the Habermasian Account of Human Rights, ed. Willy
Moka-Mubelo, 89-125. Cham: Springer, 2017.
Mordini, Emilo. “Nothing to Hide: Biometrics, Privacy and Private Sphere.” In Biometrics and
Identity Management: First European Workshop, eds. Ben Schouten, Niels Chritsian Juul,
Andrzej Drygajlo and Massimo Tistarelli, 247-257. BIOID 2008. Denmark: Springer, 2008.
National Occupational Health and Safety Commission. “Program One Report: Occupational
Violence.” 51st Meeting of NOHSC. Hobart: NOHSC, 1999.
National Sample Survey Office. “Key Indicators of Employment and Unemployment in India.” NSS
6th Round, July 2011 – June 2012. Ministry of Statistics and Programme Implementation,
Government of India, 2013.
Nissenbaum, Helen. “Protecting Privacy in an Information Age: The Problem of Privacy in Public”
(first published in 1998). In Privacy, ed. Eric Barendt, 177-215. Oxon: Routledge, 2017.
_________. “Toward an Approach to Privacy in Public: Challenges of Information Technology.” In
Readings in Cyberethics, eds. R.A. Spinello and H.T. Tavani, 392-403. Sudbury, MA: Jones
and Bartlett, 2001.
_________. “Will Security Enhance Trust Online, or Supplant It?” In Trust and Distrust in
Organizations: Dilemmas and Approaches, eds. Roderick M. Kramer and Karen S. Cook, vol.
7, 155-188. New York: Russell Sage Foundation, 2004.
Norris, Clive. “Closed-Circuit Television: A Review of Its Development and Its Implications for
Privacy.” In International Handbook of Criminology, eds. Shlomo Giora Shoham, Paul
Knepper and Martin Kett, 395-424. Boca Raton, FL: CRC Press. Taylor & Francis Group,
2010.
_________. “From Personal to Digital: CCTV, the Panopticon, and the Technological Mediation of
Suspicion and Social Control.” In Surveillance as Social Sorting: Privacy, Risk, and Digital
Discrimination, ed. David Lyon, 249-281. London: Routledge, 2003.
Norris, Clive and Gary Armstrong. “CCTV and the Social Structuring of Surveillance.” In
Surveillance of Public Space: CCTV, Street Lighting and Crime Prevention, vol. 10, eds. Kate
Painter and Nick Tilley, 157-178. Monsey, NY: Criminal Justice Press, 1999a.
Nouwt, Sjaak, Berend R. de Vries and Roel Loermans. “Analysis of the Country Reports.” In
Reasonable Expectations of Privacy? Eleven Country Reports on Camera Surveillance and
Bibliography
lxxvii
Workplace Privacy, eds. J. Nouwt, B. R., de Vries and R. J. W. Loermans, 323-359. Den
Hague: T.M.C. Asser Press, 2005.
Nussbaum, Martha C. “Human Dignity and Political Entitlements.” In Human Dignity and Bioethics:
Essays Commissioned by the President’s Council on Bioethics, ed. Adam Schulman, 351-380.
Washington: The President’s Council on Bioethics, 2008.
Ojha, Abhoy K. “Innovation and Entrepreneurship in the Indian IT Industry: Contextual
Impediments.” In Corporate Governance and Stewardship: Emerging Role and
Responsibilities of Corporate Boards and Directors, ed. N. Balasubramanian, 89-106. New
Delhi: Tata McGraw Hill Education, 2010.
Olum, Yasin. “Modern Management Theories and Practices,” Paper presented at the 15th East
African Central Banking Course, held on 12th July 2004, at Kenya School of Monetary Studies
(2004): 1-24.
Paila, Anil Rao and P.S. Rao. “Ethics in Business and Indian Value Systems: Need for Integration in
the Age of Science and Technology.” In Business Ethics and Human Values, eds. V.M. Chavan,
21-28. New Delhi: Excel Books, 2009.
Panina, Daria. “Electronic Monitoring in the Workplace.” In Encyclopedia of Human Resources
Information Systems: Challenges in e-HRM, eds. Teresa Torres-Coronas and Mario Arias-
Oliva, 314-320. Hershey, NY: Information Science Reference, 2009.
Pastin, Mark. “Ethics as an Integrating Force in Management.” In Managing Business Ethics, eds.
John Drummond and Bill Bain, 76-88. Oxford: Butterworth-Heinemann, 1996.
Petronio, Sandra and Wesley T. Durham. “Communication Privacy Management Theory. In
Engaging Theories in Interpersonal Communication: Multiple Perspectives, eds. L.A. Baxter
and D.O. Braithwaite, 309-322. Thousand Oaks, CA: Sage, 2008.
Pitesa, Marko. “Employee Surveillance and the Modern Workplace.” In Business Ethics: A Critical
Approach: Integrating Ethics Across the Business World, eds. Patrick O’Sullivan, Mark
Esposito and Mar Smith, 206-219. London: Routledge, 2012.
Ranganathan, Aruna and Sarosh Kuruvilla. “Labour Turnover in the Business Process Outsourcing
Industry in India.” In Management Practices in High-Tech Environments, eds. Dariusz
Jemielniak and Jerzy Kociatkiewicz, 110-132. PA: IGI Global, 2008.
Remesh, Babu P. “Work Organization, Control and ‘Empowerment’: Managing the Contradictions
of Call Centre Work.” In In an Outpost of the Global Economy: Work and Workers in India’s
Information Technology Industry, eds. Carol Upadhya and A.R. Vasavi, 235-262. London:
Routledge, 2008.
Ricoeur, Paul. “Love and Justice.” In Radical Pluralism and Truth: David Tracy and the
Hermeneutics of Religion, eds. Werner G. Jeanrond, and Jennifer L. Rike. Translated by David
Pellauer, 187–202. New York: The Crossroad Publishing Company, 1991.
Bibliography
lxxviii
_________. Ethical and Theological Considerations on the Golden Rule [French original 1987]. In
Figuring the Sacred, ed. Mark I. Wallace. Translated by David Pellauer, 293-302. Minneapolis:
Fortress Press, 1995.
Ritzer, George and Craig D. Liar. “The Globalization of Nothing and the Outsourcing of Service
Work.” In Service Work: Critical Perspectives, eds. Marek Korczynski and Cameron Lynne
MacDonald, 31-52. New York: Routledge, 2009.
Rogersson, Simon and Mary Prior. “New Monitoring and Surveillance Technology.” In The Ethics
of Workplace Privacy, eds. Sven Ove Hansson and Elin Palm, 57-72. Brussels: P.I.E. Lang
Publisher, 2005.
Rooksby, Emma and John Weckert. “Digital Divides: Their Social and Ethical Implications.” In
Social, Ethical and Policy Implications of Information Technology, eds. Linda L. Brennan and
Victoria E. Johnson, 29-47. Hershey: Information Science Publishing, 2004.
Roosksby, Emma and Natasha Cica. “Personal Autonomy and Electronic Surveillance in the
Workplace.” In Electronic Monitoring in the Workplace: Controversies and Solutions, ed. John
Weckert, 242-259. Hershey: Idea Group Publishing, 2005.
Rosenberg, Richard S. “The Technological Assault on Ethics in the Modern Workplace.” In The
Ethics of Human Resources and Industrial Relations, eds. John W. Budd and James G.
Scoville, 141-172. Urbana-Champaign, IL: Labour and Employment Relations Association,
2005.
Rosenblat, Alex, Tamra Kneese and Danah Boyd. “Workplace Surveillance.” Open Society
Foundations’ Future of Work Commissioned Research Papers, 1-19. New York, Data &
Society Research Institute, 2014.
Saini, Debi S. and Pawan S. Budhwar. “HRM in India.” In Managing Human Resources in Asia-
Pacific, ed. Pawan S. Budhwar, 113-140. London: Routledge, 2004.
Säljö, Roger. Minding Action - Conceiving of the World versus Participating in Cultural Practices.
In Reflections on Phenomenography - Towards a Methodology? eds. Dall'Alba and
Hasselgren, 19-33. Goteborg: Acta Universitatis Gothoburgensis, 1996.
Schat, Aaron C.H. and E. Kevin Kelloway. “Workplace Aggression.” In Handbook of Work Stress,
eds. Julian Barling, E. Kevin Kelloway, and Michael R. Frone, 189-218. Thousand Oaks, CA:
Sage, 2005.
Schumacher, Günter. “Behavioural Biometrics: Emerging Trends and Ethical Risks.” In Second
Generation Biometrics: The Ethical, Legal and Social Context, eds. Emilio Mordni and
Dimitros Tzovaras, 215-228. Dordrecht: Springer, 2012.
Selling, Joseph. “The Human Person.” In Christian Ethics: An Introduction, ed. Bernard Hoose, 95-
109. London: Cassell, 1998.
Sen, Amartya. “Capability and Well-Being.” In The Quality of Life, eds. Martha C. Nussbaum and
Amartya Sen, 30-53. Oxford: Clarendon, 1993.
Bibliography
lxxix
_________. “Development as Capability Expansion.” In Readings in Human Development:
Concepts, Measures and Policies for a Development Paradigm, eds. Sakiko Fukuda-Parr and
A.K. Shiva Kumar, 41-58. New Delhi and New York: Oxford University Press, 2003.
Sewell, Graham and Barry Wilkinson. “Empowerment or Emasculation? Shopfloor Surveillance in
a Total Quality Organization.” In Reassessing Human Resource Management, eds. Paul Blyton
and Peter Runbull, 97-115. London: Sage, 1992a.
_________. “Human Resource Management in “Surveillance” Companies.” In Human Resource
Management and Technical Change, ed. Jon Clark, 137-154. London: Sage, 1993.
Shea, Thomas H. “Workplace Violence: Turning Down the Heat.” Workplace Violence Prevention
Report 6 (2000).
Simpson, J. A. and E.S.C. Weiner. “Privacy.” The Oxford English Dictionary XII (1989): 515.
Singh, Charan. “Ethics and Business: Evidence from Sikh Religion.” Working Paper No. 439, Indian
Institute of Management Bangalore, 2013.
Sinha, Jai B.P. “A Cultural Perspective on Organizational Behaviour in India.” In New Perspectives
on International Industrial/Organizational Psychology, eds. Christopher P. Earley and M.
Erez, 53-74. San Francisco: Lexington Press, 1997.
Smith, Michael J. and Benjamin C. Amick III. “Electronic Monitoring at the Workplace: Implications
for Employee Control and Job Stress.” In Job Control and Worker Health, eds. Steven L.
Sauter, Joseph J. Hurrel jr. and Cary L. Cooper, 275-289. Chichester, New York: Wiley, 1989.
Snowden, David. “Naturalizing Sensemaking” In Informed by Knowledge: Expert Performance in
Complex Situations, eds. Kathleen L. Mosier and Ute M. Fischer, 223-234. New York:
Psychology Press, 2010.
Spinello, Richard A., John Gallaugher and Sandra Waddock. “Managing Workplace Privacy
Responsibly.” In Social, Ethical and Policy Implications of Information Technology, eds. Linda
L Brennan and Victoria E. Johnson, 74-97. Hershey: Information Science Publishing, 2004.
Srivastva, Suresh and Frank J. Barrett. “Foundations for Executive Integrity: Dialogue, Diversity,
Development.” In Executive Integrity: The Search for High Human Values in Organizational
Life, eds. Suresh Srivastva and Associates, 290-319. San Francisco, CA: Jossey-Bass, 1989.
Stahl, Bernd Carsten, Mary Prior, Sara Wilford and Dervla Collins. “Electronic Monitoring in the
Workplace: If people Don’t care, Then What is the Relevance?” In Electronic Monitoring in
the Workplace: Controversies and Solutions, ed. John Weckert, 50-78. Hershey: Idea Group
Publishing, 2005.
Stanton, Jeffrey M. “Information Technology and Privacy: A Boundary Management Perspective.”
In Socio-Technical and Human Cognition Elements of Information Systems, eds. Steve Clarke,
Elayne Coakes, M. Gordon Hunter and Andrew Wenn, 79-103. Hershey: Idea Group
Publishing, 2003.
Bibliography
lxxx
Stead, W. Edward, Dan L. Worrell and Jean Garner Stead. “An Integrative Model for Understanding
and Managing Ethical Behaviour in Business Organizations.” In Managing Business Ethics,
eds. John Drummond and Bill Bain, 58-73. Oxford: Butterworth-Heinemann, 1996.
Steeves, Valerie. “Reclaiming the Social Value of Privacy.” In Lessons from the Identity Trail, eds.
Ian Kerr, Valerie Steeves and Carole Lucock, 191-212. Oxford: Oxford University Press. 2009.
Stone, Katherine V.W. “Flexibilization, Globalization, and Privatization: Three Challenges to
Labour Rights in Our Time.” In Regulating Labour in the Wake of Globalization: New
Challenges, New Institutions, eds. Brian Bercusson and Cynthia Estlund, 115-136. Oxford:
Hart Publishing, 2008.
Stres, Anton. “Laborem Exercens and Human Work.” In Work as Key to the Social Question: The
Great Social and Economic Transformations and the Subjective Dimension of Work, by
Pontifical Council for Justice and Peace, 23-29. Vatican City: Libreria Editrice Vaticana, 2002.
Taiwo, Rotimi. “Cyber Behaviour.” In Encyclopedia of Information Science and Technology, 3rd ed.,
ed. Mehdi Khosrow-Pour, 2972-2980. Hershey, PA: Information Science Reference, 2015.
Taylor, Phil, Premilla D’Cruz, Ernesto Noronha and Dora Scholarios. “Union Formation in Indian
Call Centres.” In The Next Available Operator: Managing Human Resources in Indian
Business Process Outsourcing Industry, eds. Mohan Thitte and Bob Russell, 145-181. Los
Angeles: Response, 2009.
Tene, Omer and Jules Polonetsky. “Big Data for All: Privacy and User Control in the Age of
Analytics.” Northwestern Journal of Technology and Intellectual Property 11, no. 5 (2013):
239-273.
Thite, Mohan and Bob Russel. “Human Resource Management in Indian Call Centres/Business
Process Outsourcing.” In The Next Available Operator: Managing Human Resources in Indian
Business Process Outsourcing Industry, eds. Mohan Thitte and Bob Russell, 34-58. Los
Angeles: Response, 2009.
Tomar, Abihijeet Singh, Argha Ray, Bankim Sammadar, Khushal malik. Pravin Sharma and Sanjay
Prasad. “Workplace Monitoring in India.” RM Project: MDI Gurgaon (2013), 1-27.
Tyler, Tom R. “Self-Regulatory Approaches to White-Collar Crime: The Importance of Legitimacy
and Procedural Justice.” In The Criminology of White-Collar Crime, eds. Sally S. Simpson and
David Weisburd, 195-216. New York: Springer, 2009.
Tyler, Tom R. and Avital Mentovich. “Mechanisms of Legal Effect: Theories of Procedural Justice.”
Public Health Law Research. Robert Wood Johnson Foundation (2011), 1-26.
Uljens, Michael. “On the Philosophical Foundation of Phenomenography.” In Reflections on
Phenomenography - Toward a Methodology, eds. Gloria Dall'Alba and Biörn Hasselgren, 105–
130. Goteborg: Acta Universitatis Gothenburgensis, 1996.
Upadhya, Carol and A.R. Vasavi. “Outposts of the Global Information Economy: Work and Workers
in India’s outsourcing Industry.” In In an Outpost of the Global Economy: Work and Workers
Bibliography
lxxxi
in India’s Information Technology Industry, ed. Carol Upadhya and A.R. Vasavi, 9-49.
London: Routledge, 2008.
_________. “Work, Culture and Sociality in the Indian IT Industry: A Sociological Study.” Final
Report to the Indo-Dutch Program for Alternatives in Development, Indian Institute of Science,
Bangalore, 2006.
Upadhya, Carol. “Taking the High Road? Labour in the Indian Software Outsourcing Industry.” In
Labour in Global Production Networks in India, eds. Anne Posthuma and Dav Nathan, 300-
320. New Delhi, India: Oxford University Press, 2010.
Van der Ploeg, Irma. “Biometrics and the Body as Information: Normative Issues of the Socio-
Technical Coding of the Body.” In Surveillance as Social Sorting: Privacy, Risk, and Digital
Discrimination, ed. David Lyon, 57-74. London: Routledge, 2003.
Vergragt, Philip J. “How Technology Could Contribute to a Sustainable World.” GTI Paper Series.
Boston, MA: Tellus Institute, 2006.
Vermesan, Ovidiu, Peter Friess, Patrick Guillemin, Harald Sundmaeker and Markus Eisenhauer.
“Internet of Things Strategic Research and Innovation Agenda.” In Internet of Things:
Converging Technologies for Smart Environments and Integrated Ecosystems, eds. Ovidiu
Vermesan and Peter Friess, 7-151. Alborg: River Publishers, 2013.
Verstraeten, Johan. “Catholic Social Thought and Amartya Sen on Justice.” In Economics as Moral
Science, eds. Peter Rona and Laszlo Zsolnai, Virtues and Economics, vol. 1, 215-223.
Switzerland: Springer, 2017.
_________. “Responsible Leadership beyond Managerial Rationality: The Necessity of
Reconnecting Ethics and Spirituality.” In Leadership and Business Ethics, eds. Gabriel Flynn,
vol. 25, 131-147, Dublin: Springer, 2008.
Vorvoreanu, Michaela and Carl Botan. “Examining Electronic Surveillance in the Workplace: A
Review of Theoretical Perspectives and Research Findings.” Paper presented at the Annual
International Communication Association Conference. Acapulco, Mexico, 2000.
Wang, Faye Fangfei. “Consumer Privacy Protection in the European Union: Legislative Reform
driven by Current Technological Challenges.” In Privacy Protection Measures and
Technologies in Business Organizations: Aspects and Standards, ed. George O.M. Yee, 331-
349. Hershey, PA: Information Science Reference, 2012.
Werhane, Patricia H. and Tara J. Radin. “Employment at Will and Due Process.” In Ethical Issues
in Business: A Philosophical Approach, eds. Thomas Donaldson and Patricia H. Werhane. New
Jersey: Prentice Hall, 1996.
White, Richard D. Jr., “Drawing the Line: Religion and Spirituality in the Workplace.” In Handbook
of Workplace Spirituality and Organizational Performance, eds. Robert A. Giacalone and
Carole L. Jurkiewicz, 244-256. Armonk: M.E. Sharpe, 2003.
Bibliography
lxxxii
Youngs, Gillian. “International Relations as We Enter in the 20th Century.” In Globalization: Theory
and Practice, 2nd ed., eds. Eleonore Kofman and William Youngs, 3-16. London: Continuum,
2003.
Zirkle, Brian L. and William G. Staples. “Negotiating Workplace Surveillance.” In Electronic
Monitoring in the Workplace: Controversies and Solutions, eds. John Weckert, 79-100.
Hershey: Idea Group Publishing, 2005.
Zureik, Elia. “Theorizing Surveillance: The Case of the Workplace.” In Surveillance as Social
Sorting: Privacy, Risk, and Digital Discrimination, ed. David Lyon, 31-56. London:
Routledge, 2003.
Zweig, David. “Beyond Privacy and Fairness Concerns: Examining Psychological Boundary
Violations as a Consequence of Electronic Performance Monitoring.” In Electronic Monitoring
in the Workplace: Controversies and Solutions, ed. John Weckert, 101-122. Hershey: Idea
Group Publishing, 2005.
D. Church Documents
Benedict XVI. “Caritas in Veritate.” AAS 101 (2009). http://w2.vatican.va/content/benedict-
xvi/en/encyclicals/documents/hf_ben-xvi_enc_20090629_caritas-in-veritate.html [accessed
October 25, 2018].
Benedict XVI. “Sacramentum Caritatis.” AAS 99 (2007). http://w2.vatican.va/content/benedict-
xvi/en/apost_exhortations/documents/hf_ben-xvi_exh_20070222_sacramentum-caritatis.html
[accessed October 22, 2018].
Benedict XVI. “Deus Caritas Est.” AAS 97 (2005). http://w2.vatican.va/content/benedict-
xvi/en/encyclicals/documents/hf_ben-xvi_enc_20051225_deus-caritas-est.html [accessed
November 1, 2017].
Dicastery for Promoting Integral Human Development. “‘Oeconomicae et Pecuniariae Quaestiones’
– Considerations for an Ethical Discernment Regarding Some Aspects of the Present
Economic-Financial System.” Congregation for the Doctrine of the Faith, May 2018.
https://press.vatican.va/content/salastampa/en/bollettino/pubblico/2018/05/17/180517a.html
[accessed November 25, 2018].
Francis. “Laudato Si’.” AAS 107 (2015).
http://w2.vatican.va/content/francesco/en/encyclicals/documents/papa-
francesco_20150524_enciclica-laudato-si.html [accessed October 25, 2018].
Francis. “Evangelii Gaudium.” AAS 105 (2013). http://w2.vatican.va/content/francesco/en/apost_
exhortations/documents/papa-francesco_esortazione-ap_20131124_evangelii-gaudium.html
[accessed October 25, 2018].
John Paul II. “Laborem Exercens.” AAS 73 (1981). http://w2.vatican.va/content/john-paul-
ii/en/encyclicals/documents/hf_jp-ii_enc_14091981_laborem-exercens.html [accessed
December 15, 2017].
Bibliography
lxxxiii
John Paul II. “Centesimus Annus.” AAS 83 (1991). http://w2.vatican.va/content/john-paul-
ii/en/encyclicals/documents/hf_jp-ii_enc_01051991_centesimus-annus.html [accessed
December 20, 2017].
John Paul II. “Christifideles Laici.” AAS 80 (1988). http://w2.vatican.va/content/john-paul-
ii/en/apost_exhortations/documents/hf_jp-ii_exh_30121988_christifideles-laici.html
[accessed April 25, 2018].
John XXIII. “Mater et Magistra,” AAS 53 (1961). http://w2.vatican.va/content/john-
xxiii/en/encyclicals/documents/hf_j-xxiii_enc_15051961_mater.html [accessed December 20,
2017].
Leo XIII. “Rerum Novarum.” 1891. http://w2.vatican.va/content/leo-
xiii/en/encyclicals/documents/hf_l-xiii_enc_15051891_rerum-novarum.html [accessed
December 20, 2017].
Pontifical Council for Justice and Peace. Compendium of the Social Doctrine of the Church. London:
Continuum International, (originally, 2004) 2012.
United States Catholic Bishops. “Economic Justice for All: Pastoral Letter on Catholic Social
Teaching and the U.S. Economy.” 1986.
http://www.usccb.org/upload/economic_justice_for_all.pdf [accessed April 25, 2018].
Vatican Council II. “Gaudium et Spes.” AAS 58 (1966).
http://www.vatican.va/archive/hist_councils/ii_vatican_council/documents/vat-
ii_const_19651207_gaudium-et-spes_en.html [accessed December 20, 2017].
E. Electronic Sources
Alaniz, Richard. “The Advantages and Pitfalls of Employee Monitoring.” Fleet Financials, 2008.
http://www.fleetfinancials.com/article/story/2008/07/the-advantages-and-pitfalls-of-
employee-monitoring.aspx [accessed October 12, 2015].
Albion. “Netiquette,” http://www.albion.com/netiquette/ [accessed October 25, 2015].
Anteby, Michel and Curtis K. Chan. “Why Monitoring Your Employees’ Behaviour Can Backfire.”
Harvard Business Review, April 25, 2018, https://hbr.org/2018/04/why-monitoring-your-
employees-behavior-can-backfire [accessed October 20, 2018].
Babu, Venkatesha. “The Dream peddlers.” Business Today In, India Today Group Digital Magazines.
2015. http://www.businesstoday.in/magazine/cover-story/bt-500-2015-indian-information-
technology-services-industry/story/224947.html [accessed February 28, 2016].
Barnat, Ryszard. “Strategic Management: Formulation and Implementation.”
http://www.introduction-to-management.24xls.com/en127 [accessed March 12, 2016].
Barnes, Tom. “India’s IT Industry & Trade Unions: Are IT Workers Joining the ‘Precariat’? Labour
in the Asian Century: Thoughts and Analysis on Labour Movements in Asia and Beyond, 2015.
http://tombarnes.info/?p=259 [accessed February 25, 2016].
Bibliography
lxxxiv
Beesley, Caron. “Email, Phone and Social Media Monitoring in the Workplace – Know Your Rights
as an Employer.” https://www.sba.gov/blogs/email-phone-and-social-media-monitoring-
workplace-know-your-rights-employer [accessed September 25, 2015].
Blakemore, Michael. “Surveillance in the Workplace: An Overview of Issues of Privacy, Monitoring,
and Ethics.” GMB, 2005. http://www.mindfully.org/Technology/2005/ Surveillance-
Workplace-Blakemore1sep05.htm [accessed April 10, 2016].
Boudway, Ira. “Right or Wrong, Gallup Always Wins.” Bloomberg, November 9, 2012.
https://www.bloomberg.com/news/articles/2012-11-08/right-or-wrong-gallup-always-wins
[accessed March 25, 2017].
Brown, Brene. “Three Ways to Kill Your Company’s Idea-Stifling Shame Culture.” FastCompany,
September 2012. http://www.fastcompany.com/3001239/3-ways-kill-your-companys-idea-
stifling-shame-culture [Accessed December 18, 2017].
Carroll, Donald and Inés Guzmán. “The New Omni-Channel Approach to Serving Customers:
Strategy Implications for Communications Service Providers.” Accenture 2015.
https://www.accenture.com/be-en/~/media/Accenture/Conversion-
Assets/DotCom/Documents/Global/PDF/Industries_2/accenture-new-omni-channel-
approach-serving-customers.pdf [accessed May 15, 2017].
Chand, Smriti. “6 Major Central Trade Unions of India.” Your Article Library.
http://www.yourarticlelibrary.com/trade-unions/6-major-central-trade-unions-of-india-trade-
unions/26113/ [accessed February 18, 2016].
Chawla, A.S., Dharminder Singh and Jasleen Kaur. “Management Perspectives of Sikh Religion.”
http://www.globalsikhstudies.net/pdf/2013riv/chawla1.pdf [accessed February 28, 2018].
Chowdhury, Sagnik, Abantika Gosh and Ruhi Tewari. “Census 2011: Hindus Dip to Below 80 per
cent of Population; Muslim Share Up, Slows Down.” The Indian Express, August 27, 2015,
http://indianexpress.com/article/india/india-others/indias-population-121-09-crores-hindus-
79-8-pc-muslims-14-2-pc-census/ [accessed February 5, 2016].
Cohn, Chuck. “4 Ways Transparency Can Boost Your Business.” American Express: Open Forum,
July 1, 2013. https://www.americanexpress. com/us/small-business/openforum/articles/4-
ways-transparency-can-boost-your-business/ [accessed January 5, 2017].
Cornel Law School. “Fifth Amendment: An Overview.” Legal Information Institute.
http://www.law.cornell.edu/wex/fifth_amendment [accessed February 5, 2014].
Council of Europe. “European Convention on Human Rights and its Five Protocols,” European
Convention on Human Rights, Section 1, Article 8, 1 & 2.
http://www.globaldetentionproject.org/fileadmin/docs/European-Convention-on-Human-
Rights.pdf. [accessed October 14, 2016].
Crabtree, Steve. “Worldwide, 13% of Employees Are Engaged at Work.” Gallup, October 8, 2013.
http://www.gallup.com/poll/165269/worldwide-employees-engaged-work.aspx [accessed
March 25, 2017].
Bibliography
lxxxv
DeCew, Judith. “Privacy,” Stanford Encyclopedia of Philosophy, August 9, 2013 (first published:
May 14, 2002), http://plato.stanford.edu/entries/privacy/ [accessed February 8, 2014].
Desai, Nishith. “India: Trade Unions and Collective Bargaining.” Nishith Desai Associates, 2015.
http://www.nishithdesai.com/fileadmin/user_upload/pdfs/Research%20Papers/India-Trade-
Unions-and-Collective-Bargaining.pdf [accessed February 1, 2016].
Desrochers, Stéphane and Alexia Roussos. “The Jurisprudence of Surveillance: A Critical Look at
the Laws of Intimacy.” Lex Electronica 6, no.2 (2001): 1-12. http://www.lex-
electronica.org/files/sites/103/6-2_desrochers-roussos.pdf [accessed June 15, 2017].
Determann, Lothar and Lars Brauer. “Employee Monitoring Technologies and Data Privacy - no
one-size-fits-all Globally,” 2009. https://iapp.org/news/a/2009-05-employee-monitoring-
technologies-differ-globally/ [accessed October 5, 2015].
Dhillon, Amrit. “Big Brother Keeps Eye on Indian Call Centres.” South China Morning Post,
September 1, 2015, http://www.scmp.com/article/514350/big-brother-keeps-eye-indian-call-
centres [accessed November 12, 2016].
Dhillon, Amrit. “Big Brother Keeps Eye on Indian Call Centres.” South China Morning Post,
September 1, 2015, http://www.scmp.com/article/514350/big-brother-keeps-eye-indian-call-
centres [accessed November 12, 2016].
Ellis, Jennifer. “Internet Privacy: What is Weblining and Does It Really Exist?” Quara, November
6, 2013. https://www.quora.com/Internet-Privacy-What-is-weblining-and-does-it-really-exist
[accessed January 10, 2017].
Encyclopaedia Britannica. “Due Process.” Encyclopaedia Britannica Online Academic Edition.
http://www.britannica.com/EBchecked/topic/173057/due-process [accessed February 16,
2013].
Encyclopaedia. “Natural Law.” International Encyclopaedia of the Social Sciences. 1968.
http://www.encyclopedia.com/topic/natural_law.aspx#1-1G2:3045000862-full [accessed
February 15, 2013].
European Parliament Council Commission. “Charter of Fundamental Rights of the European Union.”
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2007:303:0001:0016:EN:PDF
[accessed October 14, 2016].
European Parliament. “General Data Protection Regulation.” Official Journal of the European
Union, May 5, 2016. http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:
32016R0679 [accessed May 28, 2018].
Fallon, Nicole. “The New Customer Service Is Here, There & Everywhere.” Business News Daily.
August 6, 2014. http://www.businessnewsdaily.com/6927-omnichannel-customer-
service.html [Accessed May 15, 2017].
Fei, Liang. “Dangerous Navigation.” Global Times, September 5, 2013.
http://www.globaltimes.cn/content/780549.shtml [accessed June 20, 2017].
Bibliography
lxxxvi
Feinberg, Ted and Nicole Robey. “Cyber-bullying: Intervention and Prevention Strategies.” National
Association of School Psychologists (NASP). Helping Children at Home and School.
http://www.nasponline.org/resources/bullying/Cyberbullying.pdf [accessed December 8,
2013].
Finklea, Kristin M. “Identity Theft: Trends and Issues.” Congressional Research Service.
http://www.fas.org/sgp/crs/misc/R40599.pdf [accessed February 15, 2013].
French, Peter. “Video Nation.” Police Review (3/7/98),
http://www.1in12.com/publications/cctv/bubble.html [accessed June 10, 2017].
Frenz, Roslyn. “Definition of Workplace Ethics.” Bizfluent, September 26, 2017.
https://bizfluent.com/about-6677585-definition-workplace-ethics.html [accessed November 5,
2017].
Gasperic, Katya. “Work Culture and Labour Market for Expats in India.” ExpatBriefing.com, 2013,
http://www.expatbriefing.com/country/india/employment-and-business/work-culture-and-
labour-market-for-expats-in-india.php [accessed February 8, 2016].
Gebler, David. “Transparency is a Key to Performance.” Blog: Business Ethics, Culture and
Performance, March 14, 2011. http://managementhelp.org/blogs/business-
ethics/2011/03/14/transparency-is-a-key-to-performance/ [accessed January 5, 2017].
Growth of Trade Union Movement. http://www.whatishumanresource.com/growth-of-trade-union-
movement [accessed February 15, 2016].
Guru, Gopal and Shiraz Sidhva. “India’s “Hidden Apartheid”.” UNESCO Courier, 2001,
https://www.questia.com/magazine/1G1-79007221/india-s-hidden-apartheid [accessed March
25, 2017].
Hambridge, Sally. “Netiquette Guidelines.” Network Working Group, 1995,
http://tools.ietf.org/pdf/rfc1855.pdf [accessed October 25, 2015].
Hinduja, Sameer and Justine Patchin. “Cyber-bullying.” Cyberbullying Research Center, 2010.
http://www.cyberbullying.us/Cyberbullying_Identification_Prevention_Response_Fact_Sheet
.pdf [accessed December 8, 2013].
Hindustan Times. India Emerges Top FDI Destination Leaving Behind China, US in 2015.
September 30, 2015. http://www.hindustantimes.com/business/india-emerges-top-fdi-
destination-leaving-behind-china-us-in-2015/story-7Dno24ijpNUtLjehW1gnGI.html
[assessed February 10, 2016].
Hirshleifer, Jack. “Privacy: Its Origin, Function, and Future, Prepared for the Conference.” The
Economics and the Law of Privacy, University of Chicago, (1979): 3.
http://www.econ.ucla.edu/workingpapers/wp166.pdf [accessed November 28, 2012].
Horniak, Virginia. “Privacy of Communication – Ethics and Technology.” Unpublished Master’s
Thesis. The Department of Computer Science and Engineering, Malardalen University, 2004):
16. http://www.idt.mdh.se/utbildning/exjobb/files/TR0390.pdf [accessed February 22, 2014].
http://deity.gov.in/sites/upload_files/dit/files/GSR3_10511(1).pdf [accessed April 20, 2016].
Bibliography
lxxxvii
Hutchins, Giles. “5 Ways to Transform Your Organization into a Purposeful Living System.”
Leadership, August 26, 2016,
https://www.sustainablebrands.com/news_and_views/leadership/giles_
hutchins/5_ways_transform_your_organization_purposeful_living_system [accessed October
20, 2018].
Imran, Hars. “Are We Closer to a Law on Privacy?” The PRS Blog, October 19, 2012.
http://www.prsindia.org/theprsblog/?tag=right-to-privacy [accessed October 10, 2016].
India Brand Equity Foundation. “IT & ITeS Industry in India.” Sectoral Report 2016.
http://www.ibef.org/industry/information-technology-india.aspx [accessed February 28,
2016].
Indiastat. “Workforce Participation Rate by Sex and by Sector in India.” Socio-economic Statistical
Information About India.
https://www.indiastat.com/labourandworkforce/380987/workparticipation/299/stats.aspx
[accessed June 20, 2017].
Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data
or Information) Rules, 2011. http://www.wipo.int/edocs/lexdocs/laws/en/in/in098en.pdf
[accessed October 12, 2018].
Information Technology Act, 2000. http://www.wipo.int/wipolex/en/text.jsp?file_id=185999
[accessed October 12, 2018].
Islamic Council. “Universal Islamic Declaration of Human Rights.” September 19, 1981.
http://www.alhewar.com/ISLAMDECL.html [accessed April 20, 2018].
Iyengar, Prashant. Privacy in India - Country Report - October 2011. October 30, 2011. http://cis-
india.org/internet-governance/country-report.pdf [accessed September 25, 2016].
Iyer, Priya. “Electronic Surveillance of Employees – Pros and Cons.” Human Resources, December
07, 2012, http://www.supportbiz.com/articles/human-resources/electronic-surveillance-
employees-%E2%80%93-pros-and-cons.html [accessed April 15, 2016].
Kemp, Richard. “Big Data and Data Protection.” Kemp IT Law (2014): 1-17.
http://www.kempitlaw.com/wp-content/uploads/2014/10/Big-Data-and-Data-Protection-
White-Paper-v1_0-November-2014.pdf [accessed November 22, 2017].
Kulkarni, Preeti and Neha Pandey Deoras. “Why Employees in India are Stressed at Workplaces.”
The Economic Times, June 19, 2015.
http://economictimes.indiatimes.com/magazines/panache/why-employees-in-india-are-
stressed-at-workplaces/articleshow/47655329.cms [accessed June 15, 2017].
Kumaraguru, Ponnurangam, Lorrie Faith Cranor, and Elaine Newton. “Privacy Perceptions in India
and the United States: An Interview Study.” The 33rd Research Conference on
Communication, Information and Internet Policy (TPRC), 2005.
http://www.cs.cmu.edu/~ponguru/tprc_2005_pk_lc_en.pdf [accessed October 5, 2016].
Bibliography
lxxxviii
LaBarre, Polly. “New Management Principles for a New Age.” Management Innovation eXchange
(MIX). http://www.managementexchange.com/blog/new-management-principles-new-age
[accessed February 15, 2016].
Lasprogata, Gail, Nancy J. King, and Sukanya Pillay. “Regulation of Electronic Employee
Monitoring: Identifying Fundamental Principles of Employee Privacy through a Comparative
Study of Data Privacy Legislation in the European Union, United States and Canada.” Stanford
Technology Law Review 4. (2004).
https://journals.law.stanford.edu/sites/default/files/stanford-technology-law-
review/online/lasprogata-regulationelectronic.pdf [accessed June 15, 2017].
Legislative Department. “The Constitution of India.” Ministry of Law and Justice, Government of
India, as on 9th November 2015, 21-22. http://lawmin.nic.in/olwing/coi/coi-english/coi-
4March2016.pdf [accessed February 2, 2016].
Lehmann, Jean-Pierre. “The Dangers of Monotheism in the Age of Globalization.” The Globalist,
March 30, 2006. http://www.theglobalist.com/dangers-monotheism-age-globalization/
[accessed March 10, 2016].
Levi, Michael. “Electronic Monitoring in the Workplace: Power through the Panopticon.” 1994.
http://besser.tsoa.nyu.edu/impact/s94/students/mike/mike_paper.html [accessed June 15,
2017].
Levin, Janet. “Functionalism.” The Stanford Encyclopaedia of Philosophy, ed. Edward N. Zalta
(Winter 2017). https://plato.stanford.edu/entries/functionalism/ [accessed March 5, 2018].
Levy, Michael. “Electronic Monitoring in the Workplace: Power through the Panopticon.”
http://besser.tsoa.nyu.edu/impact/s94/students/mike/mike_paper.html [accessed October 12,
2015].
Lohr, Steve. “Unblinking Eyes Track Employees: Workplace Surveillance Sees Good and Bad.” The
New York Times, June 22, 2014. http://www.nytimes.com/2014/06/22/technology/workplace-
surveillance-sees-goodand-bad.html [accessed December 05, 2017].
Lohr, Steve. “Workplace Surveillance and the ‘Transparency Paradox.’” The New York Times, June
21, 2014. http://bits.blogs.nytimes.com/2014/06/21/workplace-surveillance-andthe-
transparency-paradox/ [accessed December 05, 2017].
Lynch, Michael P. “Privacy and the Threat to the Self.” The New York Times, June 22, 2013.
https://opinionator.blogs.nytimes.com/2013/06/22/privacy-and-the-threat-to-the-self/
[accessed on November 15, 2017].
Maha Thera, Dhammananda. “What is Kamma? What Buddhist Believe?” Buddha Sasana,
https://www.budsas.org/ebud/whatbudbeliev/87.htm [accessed February 28, 2018].
Maheshwari, Vidhan. “Article 21 of the Constitution of India – The Expanding Horizons.”
http://www.legalserviceindia.com/articles/art222.htm [accessed October 14, 2016].
Bibliography
lxxxix
McHardy, Cristopher, Tina Giesbrecht and Peter Brady. “Workplace Monitoring and Surveillance.”
McCarthy Tétrault, 2015. http://www.mccarthy.ca/pubs/Monitoring_and_Surveillance.pdf
[accessed October 2, 2015].
Media Centre, WHO. “Ionizing radiation, Health Effects and Protective Measures.” Fact Sheet:
World Health Organization, April 2016. http://www.who.int/mediacentre/factsheets/ fs371/en/
[accessed June 20, 2017].
Meeler, David. “Five Basic Approaches to Ethical Decision-Making,” Handout for Central
Approaches to Ethics, http://faculty.winthrop.edu/meelerd/docs/rolos/5_Ethical_
Approaches.pdf [accessed November 25, 2017].
Merriam-Webster Online Dictionary, “Culture,” http://www.merriam-
webster.com/dictionary/culture [accessed February 5, 2016].
Ministry of Communication and Information Technology. The Gazette of India: Extraordinary, Part
II-Sec 3 (i). 2011. http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf
[accessed April 18, 2016].
Ministry of Electronics & Information Technology. “The Personal Data Protection Bill, 2018.”
http://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill%2C2018_0.pdf
[accessed October 16, 2018].
Ministry of Home Affairs, Government of India, “India Census 2011,”
http://www.censusindia.gov.in/2011census/c-01.html [accessed February 5, 2016].
Motkuri, Venkatanarayana. “Workforce in Indian Information Technology (IT) Industry: Exploring
NSS Employment and Unemployment Survey.” MPRA Paper No.48411, Centre for
Economics and Social Studies, Hyderabad, 2009. https://mpra.ub.uni-
muenchen.de/48411/1/MPRA_paper_48411.pdf [accessed February 18, 2016].
Mujtaba, Bahaudin G. “Ethical Implications of Employee Monitoring: What Leaders Should
Consider.” Journal of Applied Management and Entrepreneurship.
http://www.huizenga.nova.edu/Jame/articles/employee-monitoring.cfm [accessed December
8, 2013].
NASSCOM. “The IT-BPO Sector in India: Strategic Review 2011.” http://www.nasscom.
in/upload/Publications/Research/140211/Executive_Summary.pdf. [accessed April 15, 2016].
National Sample Survey. “Employment and Unemployment Situation in India 2011-12.” NSS 68th
Round, National Sample Survey Office, Ministry of Statistics & Programme Implementation,
Government of India, 2014. http://mospi.nic.in/Mospi_New/upload/nss_report_554_
31jan14.pdf [accessed February 25, 2016].
Nevogt, Dave. “Employee Monitoring Software and Tools - The Top 10 Options,” 2015.
http://blog.hubstaff.com/10-employee-monitoring-software-options-monitor-activity/
[accessed September 28, 2015].
Bibliography
xc
Nishith Desai Associates. “New Data Protection Law Proposed in India! Flavours of GDPR,” July
30, 2018, http://www.nishithdesai.com/fileadmin/user_upload/pdfs/NDA_Summary.pdf
[accessed October 16, 2018].
Open Knowledge Foundation. “Open Data Commons: Legal Tools for Open Data.”
https://opendatacommons.org/ [accessed May 15, 2017].
Organization for Economic Co-operation and Development. “OECD Benchmark Definition of
Foreign Direct Investment.” 4th ed. Paris Sedex 16: France, 2008.
https://www.oecd.org/daf/inv/investmentstatisticsandanalysis/40193734.pdf [assessed
February 15, 2016].
Organization of Islamic Conference. “Cairo Declaration on Human Rights in Islam.” August 5, 1990.
http://www.bahaistudies.net/neurelitism/library/Cairo_Declaration_on_Human_Rights_in_Isl
am.pdf [accessed April 20, 2018].
Pati, Partha and Nishith Pandit. “Surveillance in India and Its Legalities.” Legally India, June 2013.
http://www.legallyindia.com/Blogs/surveillance-in-india-and-its-legalities [accessed April 10,
2016].
Payutto, Ven. P.A. Buddhist Economics: A Middle Way for the Market Place, trans. Dhammavijaya
and Bruce Evans, compiled by Bruce Evans and Jourdan Arenson, 1994.
http://pioneer.netserv.chula.ac.th/~sprapant/Buddhism/buddhist_econ.html [accessed
February 28, 2018].
Planning Commission. “Growth Rate of GDP.” Government of India. updated in 08 July 2015.
http://planningcommission.gov.in/data/datatable/data_2312/DatabookDec2014%202.pdf
[accessed January 25, 2016].
Poster, Winifred R. “Socially Benevolent Workplace Surveillance?” Work in Progress: Sociology
on the Economy, Work and Inequality. April 30, 2015.
https://workinprogress.oowsection.org/2015/04/30/socially-benevolent-workplace-
surveillance/ [accessed November 10, 2016].
Prior, Mary. “Surveillance-Capable Technologies in the Workplace.”
http://rccs.southernct.edu/surveillance-capable-technologies-in-the-workplace/ [accessed
February 18, 2016].
Putnam, Mark S. “Workplace Surveillance: Making You More Ethical or Just Scared?” Global Ethics
University, 2003, http://www.globalethicsuniversity.com/articles/workplace surveillance.htm
[accessed February 20, 2018].
Qureshi, Annie. “Big Data is Both a Weapon and Liability with Identity Theft.”
SmartDataCollective, March 6, 2018. https://www.smartdatacollective.com/big-data-weapon-
liability-identity-theft/ [accessed October 28, 2018].
Raju, Prageetha G., “Different Manifestations of Presenteeism at Workplace: A Study of Behaviour
of Employees in I.T. Sector in India,” SSRN eLibrary, (April 15, 2012).
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2039848 [accessed April 10, 2017].
Bibliography
xci
Research & Publication Unit. “India in Figures 2015.” Central Statistics Office, Ministry of Statistics
and Programme Implementation, Government of India, New Delhi, 2015, 1-25,
http://statisticstimes.com/economy/sectorwise-gdp-contribution-of-india.php [accessed
January 25, 2016].
Riukas, Stanley. “Inherent and Instrumental Values in Ethics.” Philosophy of Values.
http://www.bu.edu/wcp/Papers/Valu/ValuRiuk.htm [accessed November 9, 2012].
Rosenblat, Alex, Tamara Kneese, and Danah Boyd. “Workplace Surveillance.” Data & Society
Working Paper prepared for: Future of Work Project supported by Open Society Foundations.
Data & Society Research Institute. October 8, 2014.
http://www.datasociety.net/pubs/fow/WorkplaceSurveillance.pdf [accessed October 15,
2015].
Schulman, Andrew. “The Extent of Systematic Monitoring of Employee E-mail and Internet Use.”
Workplace Surveillance Project, Privacy Foundation, 2001.
http://www.sonic.net/~undoc/extent.htm [accessed October 15, 2015].
Shah, Ajit Prakash. “Naz Foundation vs Government of Nct of Delhi and Others WP(C)
NO.7455/2001.” High Court of Delhi, July 2, 2009. https://indiankanoon.org/doc/100472805/
[accessed September 25, 2016].
Shah, Ajit Prakash. “Report of the Group of Experts on Privacy.” Planning Commission, Government
of India, October 16, 2012, http://planningcommission.nic.in/reports/ genrep/rep_privacy.pdf
[accessed November 10, 2016].
Shah, Farhan. “Islam, Humanism and Ecology.” Vart Land, October 14, 2016.
http://www.verdidebatt.no/innlegg/11663959-islam-humanism-and-ecology [accessed April
20, 2018].
Singh, Harsimran. “Is the BPO Iceberg Melting Under Attrition Heat?” The Economic Times,
February 10, 2005, http://articles.economictimes.indiatimes.com/2005-02-
10/news/27490856_1_attrition-heat-bpo-hr-managers [accessed April 5, 2016].
Singh, Kavita. “Work Values and Work Culture in Indian Organizations: Evidence from Automobile
Industry.” Delhi Business Review 2, no. 2 (2001),
http://www.delhibusinessreview.org/v_2n2/dbrv2n2d.pdf [accessed on February 5, 2016].
Singh, Yog Raj and Ankur Bhatnagar. “Management and Business Ethics through Indian Scriptures
and Traditions.” 2012. http://www.managementparadise.com/article/3654/ management-and-
business-ethics-through-indian-scriptures-and-traditions [accessed March 10, 2016].
Skeers, Jake. “Study Documents Exploitation in Indian Call Centres.” World Socialist Web Site,
November 23, 2005, https://www.wsws.org/en/articles/2005/11/indi-23n.html [accessed
November 12, 2016].
Social Science Research & Instructional Center. “Survey: Research Design and Quantitative
Methods of Analysis for Cross-sectional Data.” California State University, 15 August 1998,
http://www.ssric.org/trd/modules/cowi/chapter3 [accessed May 15, 2017].
Bibliography
xcii
Society for Human Resource Management (SHRM). “Managing Workplace Monitoring and
Surveillance.” February 18, 2016. https://www.shrm.org/resourcesandtools/tools-and-
samples/toolkits/pages/ workplaceprivacy.aspx [accessed May 10, 2017].
Stevens, Mark. “Due Process of Law: Procedural and Substantive Issues.” Military Law Associates.
http://faculty.ncwc.edu/mstevens/410/410lect06.htm [accessed November 25, 2012].
Stevens, Yuan and Joanna Bronowicka. “Workplace Surveillance: Is Our Privacy Protected at
Work?” Centre for Internet and Human Rights, December 2016. https://cihr.eu/workplace-
surveillance-is-our-privacy-protected-at-work/ [accessed December 15, 2017].
Stokes, Pam D. “The Corporate and Workforce Culture of India,” 2003,
http://www.sixsmart.com/SSPapers/psw10.htm [accessed February 8, 2016].
Taylor, Stephen. “Privacy is Power, as It Allows Us to be Hypocrites.”
http://www.opendemocracy.net/ourkingdom/stephen-taylor/privacy-is-power-as-it-allows-us-
to-be-hypocrites [accessed February 10, 2014].
Tayntor, Christine B. “A Practical Guide to Staff Augmentation and Outsourcing.” Information
Management: Strategy, Systems, and Technologies, 2001.
http://www.ittoday.info/AIMS/Information_Management/2-01-01.pdf [accessed February 28,
2016].
Terry, Lea. “The Management Theory of Max Weber: Use the Bureaucratic Management Theory to
Increase Efficiency.” 2011. http://www.business.com/management/management-theory-of-
max-weber/ [accessed March 10, 2016].
Textkit. “Privatus.” http://www.textkit.com/greek-latin-forum/viewtopic.php?t=11280&p=83694
[accessed November 15, 2012].
The Administrator. “Labour Market Flexibility.” Economics Online: News Analysis Theory
Comment,
http://www.economicsonline.co.uk/Global_economics/Labour_market_flexibility.html
[accessed January 25, 2016].
The American Cancer Society Medical and Editorial Content Team. “Microwaves, Radio Waves,
and Other Types of Radiofrequency Radiation.” American Cancer Society, May 31, 2016.
https://www.cancer.org/cancer/cancer-causes/radiation-exposure/radiofrequency-
radiation.html [accessed June 20, 2017].
The Centre for Internet & Society. “The Personal Data (Protection) Bill, 2013.” https://cis-
india.org/internet-governance/blog/the-personal-data-protection-bill-2013 [accessed October
16, 2018].
The IT Act 2000. “State of Surveillance India.” March 2016.
https://privacyinternational.org/node/738 [accessed April 25, 2016].
The Universal Declaration of Human Rights. Donegall Pass Community Forum, 2006.
http://donegallpass.org/UNIVERSAL_DECLARATION_OF_HUMAN_RIGHTS.pdf
[accessed February 15, 2016].
Bibliography
xciii
The World Factbook. “Economy: India.” Central Intelligence Agency, National Security Provider,
the USA. https://www.cia.gov/library/publications/the-world-factbook/geos/in.html [accessed
February 16, 2016].
Thompson, Mel. “Natural Law.” http://www.mel-thompson.co.uk/lecture%20notes/
Natural%20Law.pdf [accessed November 15, 2012].
Tracy, Brian. “Determine Your Key Result Areas.” American Management Association.
http://www.amanet.org/training/articles/determine-your-key-result-areas.aspx [accessed May
15, 2017].
Turner, Rohnda. “Employee Monitoring: An Essential Component of Your Risk Management
Strategy.” Deep Software, 2007. See http://www.softactivity.com/employee-monitoring-
softactivity.pdf [accessed December 5, 2013].
United Nations (UN). “United Nations Universal Declaration of Human Rights 1948.”
http://www.jus.uio.no/lm/un.universal.declaration.of.human.rights.1948/ portrait.a4.pdf
[accessed February 15, 2016].
United Nations Assembly. “International Covenant on Civil and Political Rights.” Part 1, Article 1,1
(adopted by the General Assembly of the United Nations on 19 December 1966 and registered
ex officio on 23 March 1976), United Nations - Treaty Series, vol. 999, I-14668, 173.
http://treaties.un.org/doc/Publication/UNTS/Volume%20999/volume-999-I-14668-
English.pdf. [accessed November 25, 2012].
United Nations Commission. “International Covenant on Civil and Political Rights.” United Nations
Human Right adopted and opened for signature, ratification and accession by General
Assembly resolution 2200A (XXI) of 16 December 1966 entry into force 23 March 1976.
http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx [accessed September 25, 2016].
United Nations Commission. “The Universal Declaration of Human Rights (UDHR).” Donegall
Pass Community Forum, (2006). http://donegallpass.org/UNIVERSAL_DECLARATION_
OF_HUMAN_RIGHTS.pdf [accessed February 8, 2014].
United Nations General Assembly. The Universal Declaration of Human Rights. (Originally
proclaimed on December 10, 1948). See the booklet of the same published on 2015 in
http://www.un.org/en/udhrbook/pdf/udhr_booklet_en_web.pdf [accessed December 15,
2017].
United Nations Human Rights Office of the High Commissioner for Human Rights. International
Covenant on Civil and Political Rights. http://www.ohchr.org/en/professionalinterest/
pages/ccpr. aspx [accessed December 15, 2017].
Urteaga, Marcela. “Lean Management: A Socio-Technical Systems Approach to Change.” STS
Roundtable, Sociotechnical Systems Roundtable Inc., March 16, 2014.
http://stsroundtable.com/2014/03/16/lean-management-a-socio-technical-systems-approach-
to-change/ [accessed March 5, 2018].
USA Security Systems Blog. “How Electromagnetic Waves are Used in Security Cameras.”
Surveillance Cameras & Security News, March 25, 2014.
Bibliography
xciv
http://blog.usasecuritysystems.com/electromagnetic-waves-used-security-cameras/ [accessed
June 20, 2017].
Velasquez, Manuel, Claire Andre, Thomas Shanks, S.J., and Michael J. Meyer. “Thinking Ethically.”
Markkula Center for Applied Ethics, August 1, 2015. https://www.scu.edu/ethics/ethics-
resources/ethical-decision-making/thinking-ethically/ [accessed November 25, 2017].
Warren, Samuel and Louis Brandeis. “The Right to Privacy.” Harvard Law Review 4 (1890): 193-
220. http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html
[accessed February 18, 2014].
Wasserman, Tom. “Creating a Seamless Omni-Channel Customer Experience.” Mobile Business
Insights. December 30, 2015. http://mobilebusinessinsights.com/2015/12/creating-a-seamless-
omni-channel-customer-experience/ [Accessed May 15, 2017].
Willis Towers Watson. “Full Report: Towers Watson/NBGH 2013/2014 Employer Survey on
Purchasing Value in Health Care.” May 2014. https://www.towerswatson.com/en/Insights/IC-
Types/Survey-Research-Results/2014/05/full-report-towers-watson-nbgh-2013-2014-
employer-survey-on-purchasing-value-in-health-care [accessed June 20, 2017].
Winner, Larry. “Applied Statistical Methods.” University of Florida, Lecture Notes, 2009.
http://www.stat.ufl.edu/~winner/statnotescomp/appstat.pdf [accessed May 20, 2016].
WiseGEEK, “What is a Code of Ethics?” http://www.wisegeek.com/what-is-a-code-of-ethics.htm
[accessed November 15, 2017].
World Development Indicators. “India: Distribution of the Workforce across Economic Sectors from
2000-2012.” World Bank. http://www.statista.com/statistics/271320/distribution-of-the-
workforce-across-economic-sectors-in-india/ [accessed February 18, 2016].
World Economic Forum. “Why Care about Faith?” Global Agenda Council on the Role of Faith,
2014.
http://www3.weforum.org/docs/GAC/2014/WEF_GAC_RoleFaith_WhyCareAboutFaith_Re
port_2014.pdf [accessed October 30, 2017].
Wugmeister, Miriam. “Comparing the U.S. and EU Approach to Employee Privacy,” 2008.
http://www.mofo.com/resources/publications/2008/02/comparing-the-us-and-eu-approach-to-
employee-pri__ [accessed September 25, 2015].
Xynou, Maria and Elonnai Hickok. “Security, Surveillance and Data Sharing Schemes and Bodies
in India.” 2015. http://cis-india.org/internet-governance/blog/security-surveillance-and-data-
sharing.pdf [accessed April 18, 2016].
Zuboff, Shoshana. “The Secrets of Surveillance Capitalism.” Frankfurter Allgemeine, Feuilleton,
2016, http://www.faz.net/aktuell/feuilleton/debatten/the-digital-debate/shoshana-zuboff-
secrets-of-surveillancecapitalism-14103616.html [accessed October 20, 2018].
GENERAL INTRODUCTION
Ours is a nosy era, in which each day comes to force more intrusions – by government,
corporations, ex-lovers, busybodies, news reporters, or worrisome strangers – encroaching
on our sense of serenity and solitude.1
STATE OF THE ART
Today, information technologies and computer-mediated communications are rapidly conquering the
world with their accelerated and fast-tracked networks. The life prospects of human beings are being
bolstered in many directions by means of these technological advancements and their wide
application in all areas of daily affairs. The information explosion also generates multifaceted
questions regarding access to information, freedom of expression, right to privacy, intellectual
property rights, and matters of cultural diversity, among many others.2 Such extensive use of
Information Technology (IT) devices in the organizational workplace3 paves the way for multiple
forms of surveillance both on an individual and social level,4 with both desirable and undesirable
consequences. This evolution is in tension with another fact: the workplace is today a major locus of
human life, where many possibilities for human interaction and growth are generated and endorsed.
When the workplace itself becomes a centre of information technology,5 the evaluation of
surveillance systems and technologies and their appropriate role beomce especially significant. The
term surveillance, today, once reserved for activities of the police and intelligence community, now
seems as a customary and even unavoidable feature of daily reality.
For many of us are surveilled all day, every day, as we walk beneath street cameras, swipe cards and
surf the internet.6 According to David Lyon, for those being surveilled or watched in the
surveilling/watching process, this watching itself becomes a way of life.7 For instance, Lyon takes it
as a truism that “surveillance is an everyday fact of life that we not only encounter from outside, as
it were, but also in which we engage, from within, in many contexts.”8 In the same way, several
agencies are using increasingly sophisticated computer systems – especially searchable databases –
1 David Brin, The Transparent society: Will Technology Force us to Choose between Privacy and Freedom?
(Massachusetts: Perseus Books, 1998), 54. 2 Michael J. Quinn, Ethics for the Information Age, 5th ed. (Boston, MA: Pearson, 2012), 2-4. 3 In this research, the notion of organizational workplace focuses generally on the IT, ITeS workplaces along
with BPOs and call centres, where the unwarranted monitoring and tracking systems are implemented
thinking of safety and security and where the possible and actual data manipulation and power control are
excessively experienced. 4 John Weckert, Electronic Monitoring in the Workplace: Controversies and Solutions (Hershey: Idea Group,
2005), vi-xi. 5 Scott C. D’Urso, “Who’s Watching Us at Work? Toward a Structural-Perceptual Model of Electronic
Monitoring and Surveillance in Organizations,” Communication Theory 16 (2006): 282; Carl Botan,
“Communication Work and Electronic Surveillance: A Model for Predicting Panoptic Effects,”
Communication Monographs 63 (1996): 293-313. 6 David Lyon, ed., Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination (London:
Routledge, 2003), 1-8. 7 David Lyon, The Culture of Surveillance: Watching as a Way of Life (Cambridge: Polity Press, 2018), 2.
Lyon observes that surveillance culture takes shape when ordinary people contribute to surveillance by their
own participation in different ways, such as using websites, etc. and he calls turning of this phenomenon as
the culture of surveillance. 8 Lyon, The Culture of Surveillance: Watching as a Way of Life, 4. People welcome it as a means to security,
convenience, enjoyable possibility of modern devices, etc. and engage oneself through social media and othe
website activities and contribute to socio-cultural transformation. This surveillance culture, he states, “is
multifaceted, complicated, fluid and rather unpredictable.” Lyon, The Culture of Surveillance: Watching as
a Way of Life, 10.
General Introduction
2
to keep tabs on us at home, work and play. A digital big brother is at work. Developments in
information technology have made it easier for employers to engage in surveillance of employees in
the workplace. The Internet-of-Things (IoT), for example, has made it possible to monitor both the
location of employees and their physical activities.9 In this milieu, management failure to oversee its
workforce is regarded as a failure in its mandate.10 Academic research11 and management surveys12
have established that electronic surveillance and employee monitoring are increasing every year, and
the past two decades in particular have seen rapid and alarming growth in this area. For instance,
today “the advent of an almost ubiquitous network records, browser history retention, phone apps,
electronic sensors, wearable fitness trackers, thermal sensors, and facial recognition systems”13
increase the capacity for surveillance of workers. Researchers have approached the issue of
workplace or employee surveillance in a variety of ways, showing that organizations and surveillance
go hand in hand and that surveillance occurs in both social and technological forms.14
Today it is possible to assess and monitor employees as never before, and this brings with it a promise
of fundamental changes in how work is done. Inexpensive and user-friendly devices and methods
are used in the workplace to control, monitor, and process information about employees and expose
it to the public. Forms of technology used include “video and audio surveillance, heat, light, motion,
sound and olfactory sensors, night vision goggles, electronic tagging, biometric access devices, drug
testing, DNA analysis, computer monitoring including email and web usage and the use of computer
9 Gundars Kaupins and Malcolm Coco, “Perceptions of Internet-of-Things Surveillance by Human Resource
Managers,” S.A.M. Advanced Management Journal 82, no. 1 (2017): 53-61, 68. The IoT related monitoring
devices will be illustrated in the fist chapter. 10 John Kimani Gichuhi, James Mark Ngari and Thomas Senaji, “Employees’ Response to Electronic
Monitoring: The Relationship between CCTV Surveillance and Employees’ Engagement,” International
Journal of Innovative Research & Development 5, no. 7 (2016): 141. 11 Ifeoma Ajunwa, Kate Crawford, and Jason Schultz, “Limitless Worker Surveillance,” California Law Review
105 (2017): Lisa Guerin, Smart Policies for Workplace Technologies: Email, Social Media, Cell Phones &
More, 5th ed. (Berkeley, CA: Nolo, 2017), 17, 48-55; 735-776; Rebecca M. Chory, Lori E. Vela and Theodore
A. Avtgis, “Organizational Surveillance of Computer-Mediated Workplace Communication: Employee
Privacy Concerns and Responses,” Employee Responsibilities and Rights Journal 28, no. 1 (2016): 23-43;
Shuchih Ernest Chang, Anne Yenching Liu and Sungmin Lin, “Exploring Privacy and Trust for Employee
Monitoring,” Industrial Management & Data Systems 115, no. 1 (2015): 88-106; Peter Jeffrey Holland, Brian
Cooper and Rob Hecker, “Electronic Monitoring and Surveillance in the Workplace: The Effects on Trust in
Management, and the Moderating Role of Occupational Type,” Personnel Review 44, no. 1 (2015):161-175;
Donald E. Sanders, John K. Ross and Patricia Pattison, “Electronic Snoops, Spies, and Supervisory
Surveillance in the Workplace,” Southern Law Journal 23 (2013): 1-27; Kirstie Ball, “Workplace
Surveillance: An Overview,” Labour History 51, no. 1 (2010): 87-106; G. Stoney Alder, Marshall Schminke,
Terry W. Noel and Maribeth Kuenzi, “Employee Reactions to Internet Monitoring: The Moderating Role of
Ethical Orientation,” Journal of Business Ethics 80, no. 3 (2008): 481-498. 12 Australian Electronic Workplace Survey 2012 (Peter Jeffrey Holland, Brian Cooper and Rob Hecker,
“Electronic Monitoring and Surveillance in the Workplace: The Effects on Trust in Management, and the
Moderating Role of Occupational Type,” Personnel Review 44, no. 1 (2015):161-175.); Electronic
Monitoring and Surveillance Survey done by the American Management Association (AMA) and The ePolicy
Institute each year between 2001 and 2009 (2009 Electronic Business Communication Policies & Procedures
Survey, http://www.epolicyinstitute.com/2009-electronic-business-communication-policies-procedures-
survey-results; 2007 Electronic Monitoring & Surveillance Survey, http://www.epolicyinstitute.com/2007-
survey-results; 2006 Workplace E-mail, Instant Messaging & Blog Survey,
http://www.epolicyinstitute.com/2006-workplace-e-mail-instant-messaging-blog-survey; 2005 Electronic
Monitoring & Surveillance Survey http://www.epolicyinstitute.com/2005-electronic-monitoring-
surveillance-survey-results; 2004 Workplace E-Mail and Instant Messaging Survey Summary,
http://www.epolicyinstitute.com/2004-workplace-e-mail-and-instant-messaging-survey-summary; and 2001
AMA, US News, ePolicy Institute Survey, http://www.epolicyinstitute.com/docs/ePolicyInstitute-AMA-
2001Survey-SummaryFinal.pdf [accessed October 20, 2015]). 13 Ajunwa, Crawford, and Schultz, “Limitless Worker Surveillance,” 743. 14 Ball, “Workplace Surveillance: An Overview,” 87-106.
General Introduction
3
techniques such as expert systems, matching and profiling, data mining, mapping, network analysis
and simulation.”15 David Wright et al. write that a “surveillance society is one in which the use of
surveillance technologies has become virtually ubiquitous and in which such use has become widely
(but not uniformly) accepted by the public as endemic and justified by its proponents as necessary
for economic, security, or other [such] reasons.”16 Also today, employee monitoring is a familiar
reality.17 Organizations use a variety of technologies and methods both to achieve increased
productivity, performance and profitability on the one hand, and to monitor how employees are
engaged in the workplace on the other. This is generally seen as a means of pursuing their
commitment to the organization’s goals and values.18
However, few studies have suggested a positive correlation between surveillance (CCTV monitoring,
etc.) and employees’ engagement.19 Through strict monitoring, it is generally held that employers
are fulfilling their obligation to prevent the disclosure of the company’s trade and other secrets
(protecting corporate resources) and maintain its good reputation (protecting the organization’s
intellectual property assets from technological and cyber-espionage). Many hold that this generally
couples with ensuring employees’ responsible execution of roles on company activities.20 Through
surveillance and employee monitoring, organizations thus try to harmonize and coordinate employee
behaviours by controlling and directing them towards individual and organizational goal
achievement.21 Some researchers tend to view digital surveillance as an acceptable means of
promoting both employee discipline and efficiency, regarding it as a ‘good watchdog’ in the
organization and unbiased method of performance evaluation.22 Attention is given here to employee
performance, as well as to the implementation and use of ICTs within the means of an organization.
15 Gary T. Marx, “What’s New about the ‘New Surveillance’? Classifying for Change and Continuity,” in The
Surveillance Studies Reader, eds. Sean P. Hier and Josh Greenberg, 83-94 (New York: McGraw-Hill, 2007),
83-84. 16 David Wright et al., “Questioning Surveillance,” Computer Law & Security Review 31 (2015): 281. We
admit here that job relevance of few professions (e.g., defence sector) necessitates some form of surveillance. 17 Though there is a conceptual difference between the terms monitoring (“generic and applicable to all
automated collecting of information regardless of purpose”) and surveillance (“refers to a relationship
between some authority and those whose behaviour it wishes to control”), and the former is generally
considered as a precondition for the later, both these terms are interchangeably used in this research. Carl
Botan and Mihaela Vorvoreanu, “What Do Employees Think about Electronic Surveillance at Work?” in
Electronic Monitoring in the Workplace: Controversies and Solutions, ed. John Weckert, 123-144 (Hershey:
Idea Group Publishing, 2005): 125. Cf. Simon Rogersson and Mary Prior, “New Monitoring and Surveillance
Technology,” in The Ethics of Workplace Privacy, eds. Sven Ove Hansson and Elin Palm, 57-72 (Brussels:
P.I.E. Lang Publisher, 2005), 57-58. Many other researchers of workplace surveillance also use these terms
interchangeably and as synonyms. For instance, Jonathan P. West and James S. Bowman, “Electronic
Surveillance at Work: An Ethical Analysis,” Administration & Society 48, no. 5 (2016): 628-651; Sam
Sarpong and Donna Rees, “Assessing the Effects of “Big Brother” in a Workplace: The Case of WAST,”
European Management Journal 32 (2014): 216; Kirstie Ball, “Workplace surveillance: An overview,”
Labour History 51, no. 1 (2010): 87-106. 18 Jonathan P. West and James S. Bowman, “Electronic Surveillance at Work: An Ethical Analysis,”
Administration & Society 48, no. 5 (2016): 630. 19 Gichuhi, Ngari and Senaji, “Employees’ Response to Electronic Monitoring,” 141-150. 20 Martin S. Bressler and Linda Bressler, “Protecting Your Company's Intellectual Property Assets from
CyberEspionage,” Journal of Legal, Ethical and Regulatory Issues 17, no. 2 (2014): 1; Marc J. Epstein and
Adriana R. Buhovac, Making Sustainability Work: Best Practices in Managing and Measuring Corporate
Social, Environmental, and Economic Impacts, 2 ed. (San Francisco: Berrett-Koehler Publishers, 2014), 126-
131; Gichuhi, Ngari and Senaji, “Employees’ Response to Electronic Monitoring,” 141. 21 Gichuhi, Ngari and Senaji, “Employees’ Response to Electronic Monitoring,” 142. 22 Alex Rosenblat, Tamara Kneese, and Danah Boyd, “Workplace Surveillance,” Data & Society Working
Paper, prepared for: Future of Work Project supported by Open Society Foundations, Data &Society
Research Institute, 2014. http://www.datasociety.net/pubs/fow/WorkplaceSurveillance.pdf [accessed
October 15, 2015]; Ajunwa, Ifeoma, Kate Crawford, and Jason Schultz. “Limitless Worker Surveillance.”
California Law Review 105 (2017): 735-776.
General Introduction
4
Surveillance in the workplace is often viewed as a management strategy and used to control and
manage employees.23 Why is this issue so alarming today? The reason is the impact it has both on
individuals (privacy, ethics and human rights) and society (power, social exclusion, etc.), which has
not yet been sufficiently studied researchers.
Although these advantages are vital and supportive to organizations, the disadvantages of employee
surveillance may outweigh them. There are as many concerns and debates over employee privacy as
over security in organizations.24 The controlling factor of workplace surveillance outweighs its
counterpart, namely, the protective needs of organizations.25 It introduces negative feelings among
employees, affecting their well-being by creating discomfort, frustration and a sense of
vulnerability.26 Organizations often use technology to control and micromanage their employees,
whittling away their rights. Researchers have cast doubt on whether surveillance is implemented
fairly (according to reasonable standards) with regard to its relations and nearness to work scenarios
and how it affects the quality of work life.27 The impact of information gathering on employees
depends largely on how it is collected, processed and used, who has access to it, and how it is
communicated to a third party.28 In this regard, continual surveillance is said to be a dehumanizing
process.29 This shows that the effects of surveillance may not fit with the goals of an institution.30
Such surveillance is often met with resistance from employees, as it raises concerns about employees’
rights, due process, fairness, etc.31 A tangible effect of this scenario is withdrawal behaviour on the
part of the employees.
The irony of electronic surveillance, as researchers have observed, is that it is so frequently used and
so little understood.32 Supporters of surveillance often focus intensively and exclusively on its
potential benefits, whereas critics principally highlight potential abuses of the process and techniques
23 Ball, “Workplace Surveillance: An Overview,” 87-89. Marx, “What’s New about the ‘New Surveillance’?
Classifying for Change and Continuity,” 84. 24 Vidushi Jaswal, “Psychological Effects of Workplace Surveillance on Employees, and the Legal Protection:
An Analysis,” Bharati Law Review (Jan.- March 2017): 60-61; Saby Ghoshray, “Employer Surveillance
Versus Employee Privacy: The New Reality of Social Media and Workplace Privacy,” Northern Kentucky
Law Review 40 (2013): 593-626. 25 Marko Pitesa, “Employee Surveillance and the Modern Workplaces,” Research Collection Lee Kong Chian
School of Business, Institutional Knowledge at Singapore Management University (2012), 2. 26 Jaswal, “Psychological Effects of Workplace Surveillance on Employees, and the Legal Protection,” 59-69. 27 Johnathan Yerby, “Legal and Ethical Issues of Employee Monitoring,” Online Journal of Applied Knowledge
Management 1, no. 2 (2013): 44-55. 28 France Bélanger and Robrt E. Crossler, “Privacy in the Digital Age: A Review of Information Privacy
Research in Information Systems,” MIS Quarterly 35, no. 4 (2011): 1017-1041; Vidushi Jaswal,
“Psychological Effects of Workplace Surveillance on Employees, and the Legal Protection: An Analysis,”
Bharati Law Review (Jan.- March 2017): 59-69; Shuchih Ernest Chang, Anne Yenching Liu and Sungmin
Lin, “Exploring Privacy and Trust for Employee Monitoring,” Industrial Management & Data Systems 115,
no. 1 (2015): 88-106; Peter Jeffrey Holland, Brian Cooper and Rob Hecker, “Electronic Monitoring and
Surveillance in the Workplace: The Effects on Trust in Management, and the Moderating Role of
Occupational Type,” Personnel Review 44, no. 1 (2015):161-175. 29 Jaswal, “Psychological Effects of Workplace Surveillance on Employees, and the Legal Protection,” 64. 30 Alex Rosenblat, Tamara Kneese, and Danah Boyd, "Workplace Surveillance,” Data & Society Working
Paper, prepared for: Future of Work Project supported by Open Society Foundations, Data &Society
Research Institute, 2014. http://www.datasociety.net/pubs/fow/WorkplaceSurveillance.pdf [accessed
October 15, 2018]; David Lyon, Surveillance Studies: An Overview (Cambridge, MA: Polity, 2008), 86. 31 Chory, Vela and. Avtgis, “Organizational Surveillance of Computer-Mediated Workplace Communication,”
23-43. 32 Michaela Vorvoreanu and Carl Botan, “Examining Electronic Surveillance in the Workplace: A Review of
Theoretical Perspectives and Research Findings,” Paper presented at the Annual International
Communication Association Conference, Acapulco, Mexico, 2000, 4.
General Introduction
5
used for surveillance.33 It is therefore equally and critically important to balance a legitimate need to
safeguard organizational interests with the genuine human concerns of employees. For the issue is
often a matter of conflicting rights and interests: employers have a legitimate interest in increased
productivity, efficiency and profit, direct and vicarious liability alleviation, protection against theft
and fraud, etc. while employees have their own interests and rights to privacy, dignity, autonomous
social status and justice, and self-actualization.34 Moreover, though general surveillance and
attendant privacy issues are often the subject of debate, specifically electronic surveillance in the
organizational workplace is less often debated or researched, due mostly to the great dissensus
between employer and employee perspectives. For this reason, a comprehensive picture has not yet
been adequately mapped in the discussion. Because of this narrow-minded focus, surveillance in the
workplace is seldom interpreted or framed as an ethical issue and the human effects of technological
applications are often overlooked. Administering surveillance technology with ethical analysis,
therefore, is much needed today, given that it involves, in a workplace context, an incessant and
organized collection of personal data that has a significant effect on employees’ personal data.
The dilemma is therefore manifold: First, scholarly studies undertaken on this issue from a
principally administrative and legal point of view tend to lack a moral framework and thus prove
unable to offer an integral understanding of the issues at stake. One organizational or managerial
decision framework for using surveillance technologies in the workplace focuses both on “user
experience, the data collected, business applications, technology effectiveness, security, and legal
standards”35 as well as on “operational intelligence, business rules, social collaboration, and
employee/equipment workflow”36. None of these focus entirely or even partly on the ethics of
surveillance and employee monitoring. Second, many scholars tend to focus exclusively on
individual rights, such as privacy,37 even at the risk of overlooking the social impact and
consequences of these rights and their exercise. Third, the ability of surveillance to become
embedded in work scenarios is ignored rarely scrutinized. Fourth, seeing workplace surveillance as
management strategy leads one to identify only a contractual basis and justification for this practice
and to forget the all-encompassing, instantaneous and persistent nature of surveillance in this
computer age. Fifth, the clutches of technological determinism may disregard the need to value
33 G. Stoney Alder, “Ethical Issues in Electronic Performance Monitoring: A Consideration of Deontological
and Teleological Perspectives,” Journal of Business Ethics 17 (1998): 729-743. 34 Jonathan P. West, and James S. Bowman, “Electronic Surveillance at Work: An Ethical Analysis,”
Administration & Society 48, no. 5 (2016): 628-651; Mahmoud Moussa, “Monitoring Employee Behaviour
Through the Use of Technology and Issues of Employee Privacy in America,” SAGE Open (April-June 2015):
1-15; Kirstie Ball, “Workplace Surveillance: An Overview,” Labour History 51, no. 1 (2010): 87-106; Myria
Watkins Allen et al., “Workplace Surveillance and Managing Privacy Boundaries,” Management
Communication Quarterly 21, no. 2 (2007): 172-200. 35 Kaupins and Coco, “Perceptions of Internet-of-Things Surveillance by Human Resource Managers,” 54. 36 Kaupins and Coco, “Perceptions of Internet-of-Things Surveillance by Human Resource Managers,” 54. 37 Gianclaudio Malgieri and Bart Custers, “Pricing Privacy – The Right to Know the Value of Your Personal
Data,” Computer Law & Security Review 34 (2018): 289-303; Ajunwa, Crawford, and Schultz, “Limitless
Worker Surveillance,” 735-776; Chory, Rebecca M., Lori E. Vela and Theodore A. Avtgis. “Organizational
Surveillance of Computer-Mediated Workplace Communication: Employee Privacy Concerns and
Responses.” Employee Responsibilities and Rights Journal 28, no. 1 (2016): 23-43; Chang, Liu and Lin,
“Exploring Privacy and Trust for Employee Monitoring,” 88-106; Saby Ghoshray, “Employer Surveillance
Versus Employee Privacy: The New Reality of Social Media and Workplace Privacy,” Northern Kentucky
Law Review 40 (2013): 593-626; Daniel J. Solove, Understanding Privacy (Cambridge: Harvard University
Press, 2009), 1; Daniel J. Solove, “Taxonomy of Privacy,” University of Pennsylvania Law Review 154
(2006): 477-564; Philip Brey, “The Importance of Workplace Privacy,” in The Ethics of Workplace Privacy,
eds. Sven Ove Hasson and Elin Palm (Brussels: P.I.E.-Peter Lang, 2005), 97-118.
General Introduction
6
employees’ intrinsic worth and pursue a person-centered approach that challenges a strictly
managerial rationality.
This is a non-exhaustive list. Further challenges and responses will be addressed in the progress of
this research. Through this research, in our effort to bild a case for the ethical reform of electronic
surveillance practices, we assume that the absence of integrated socio-ethical principles (rights,
justice and virtues) and practices amounts to a moral vacuum within the workplace. This in turn will
be seen to confirm that employees, with their intrinsic worth and dignity as human persons, should
respected and valued over technologies and the demands of a strictly managerial rationality. The
perception that workplace surveillance is normal and reasonable is hard to challenge. This is so in
part because broader debates around related issues – of information use, rights, power and social
structure, etc. – often suggest that workplace surveillance can violate individual rights, perpetuate
existing inequalities in the workplace, and create new ones.38 This type of evaluation demands a
reasonable, transparent, accountable and proportional workplace management process and model.
Thus, a cross-disciplinary standpoint that includes sociological, psychological, ethical perspectives
is required to develop a new research problematic.
WORKING HYPOTHESIS AND RESEARCH QUESTIONS
The working hypothesis of this research is based on the idea that electronic monitoring, though newer
in origin, is more invasive than traditional forms of direct personal supervision in the workplace.
Although general surveillance and subsequent privacy issues are the subject of constant debate, this
research starts from the premise that the use of ICTs within a society (socially, organizationally, and
individually) can create, perpetuate or exacerbate morally undesirable inequalities and have morally
significant effects in areas related to information, societal participation and economics.39 To frame
the hypothesis further: beyond individual constraints such as a person’s right to privacy,
organizational electronic surveillance raises many social concerns, such as social sorting, that often
overshadow its anticipated benefits. Besides, one must consider the relative proficiencies of
employers and employees to manage and ethically explicate electronic monitoring (e-surveillance)
in the workplace, with special attention to actual socio-cultural scenarios and particular business
contexts experienced regionally and globally.
In this context, we formulate the principal research question of this study:
(1) Does the use of electronic surveillance in the organizational workplace, which seems to be
a ‘normal phenomenon’ in today’s multifaceted technological era, ethically endanger
employees’ individual and social rights and interests, in the context of a current socio-economic
and employee management paradigm?
In connection with this key research question, we will address several sub-questions to contextualize
the research:
38 Ball, “Workplace Surveillance: An Overview,” 87-106. 39 Emma Rooksby and John Weckert, “Digital Divides: Their Social and Ethical Implications,” in Social,
Ethical and Policy Implications of Information Technology, eds. Linda L. Brennan and Victoria E. Johnson,
29-47 (Hershey: Information Science Publishing, 2004), 37.
General Introduction
7
(2) Do the characteristics of surveillance practices affect the lives and identities of
organizational workers in India, in particular, by reconfiguring the nature and ethical canvas of
Indian society and its business work-culture? 40
(3) Does David Lyon’s41 analysis of surveillance as ‘social sorting’ contribute to a more
adequate socio-ethical assessment of electronic surveillance in the workplace?
(4) What management strategy could integrate moral principles and norms, and thus provide
an ethical alternative to electronic surveillance in the workplace?
(5) How relevant are various religious teachings, especially a Catholic ethic of work and
concern for human dignity (a person-centered view) and the subjective dimension of work, in
relation to organizational surveillance?
Thus, while assessing the present ways and means of electronic surveillance in the organizational
workplace and its subsequent impact on employees, particularly the aspect of the invasion of privacy,
this research explores the social and ethical concerns and problems of this ubiquitous practice in a
way that goes beyond individual privacy and responds to the issue ethically, pointing to a person-
centered management paradigm. This research generally covers five areas of ethical application –
values, interpersonal relationships, commitment, work ethic and worldview – and analysed the
problem on both a conceptual and theoretical basis with attention to benefits, proportionality (in
terms of goals, means, and costs), alternative means, and appropriateness (informed consent, fair
procedure, job relevance, etc.).
40 Why India? Having a workforce close to half a billion people and witnessing and experiencing a radical
transformation from predominantly rural agriculture-based country to urban industrialized and to the current
ICT based knowledge-service country, India emerges today as a major global power. Besides, being an
important venue for emerging service sectors including financial accounting, call centres, and business
process outsourcing, India has become a leading centre for offshore outsourcing. On account of these reasons,
the experienced rapid growth of ICT in the Indian organizational workplace entails an extensive use of
electronic surveillance means and practices and causes for individual and social impacts in both ways – good
or bad. It requires, therefore, a critical exploration. Thus, it is both appropriate and essential to investigate
how it addresses the needs of the employees and the challenges it brings forward. P.V. Raghavan, R.
Vaithianthan and V.S. Murali, General Economics for the CA Common Proficiency Test, 2nd ed. (Chandigarh:
Pearson, 2015), B.11-23; Institute for Human Development, India Labour and Employment Report 2014:
Workers in the Era of Globalization (New Delhi: AF and IHD, 2014), 75; Sulakshna Dwivedi, Sanjay Kaushik
and Luxmi, “Impact of Organizational Culture on Commitment of Employees: An Empirical Study of BPO
Sector in India,” Vikalapa 39, no. 3 (2014): 77-92; Sumit Kumar Majumdar, India’s Late, Late Industrial
Revolution (Cambridge: Cambridge University Press, 2012), 67, 158-166. 41 David Lyon, best known internationally for his contribution as sociologist, is the Director of the Surveillance
Studies Centre, and is Queen’s Research Chair in Surveillance Studies and Professor of Sociology and of
Law in Queen’s University, Canada. He is also the co-editor of the journal Surveillance & Society, Associate
Editor of The Information Society and is on the international editorial board of a number of other academic
journals. He is the author of The Electronic Eye: The Rise of Surveillance Society (1994); Surveillance
Society: Monitoring Everyday Life (2001); Surveillance after September 11 (2003); Surveillance as Social
Sorting: Privacy, Risk, and Digital Discrimination (2005); Theorizing Surveillance: The Panopticon and
Beyond (2006); Identifying Citizens: ID Cards as Surveillance (2009); Eyes Everywhere: The Global Growth
of Camera Surveillance (2011); Liquid Surveillance: A Conversation (2013); and The Culture of Surveillance:
Watching as a Way of Life (2018). He is important for this research is also because of his contribution for
surveillance studies especially for the concept ‘surveillance as social sorting’ which is used in this research
as a hermeneutical key to analyse the social effects of workplace surveillance.
General Introduction
8
METHODOLOGY
This study is exploratory, centering on a critical descriptive analysis of the issues described above
meant to ensure familiarity with the phenomenon of digital or electronic surveillance in the
workplace and its individual and socio-ethical effects. This approach makes possible a “flexible
design” that enables us to consider different aspects of the problem addressed, as compared to the
“rigid design” of a descriptive or diagnostic study, meant to maximise protection against bias and
ensure reliability.42 This study also follows the methodology of theoretical analysis (literature
reviews) and a method of critical discourse analysis (how in a discourse, for example a managerial
discourse, one finds elements of inequality, of oppression, of racism, of reductionist vision, etc.).
One can describe this as a critical hermeneutic approach to the discourses we consider. With this
methodology we formulate a problem, related to digital surveillance and its impact on employees,
then undertake a precise investigation from an operational point of view. Along with this general
methodology, an analytic research method is applied in all chapters of this study insofar as each aims
to determine the frequency with which digital surveillance occurs or with which it is associated with
additional trends. The method of examination of records (surveys and case studies) is also applied to
describe the changing behavioural characteristics of employees in relation to digital surveillance.
The primary lens for our social analysis and critical evaluation of organizational surveillance will be
the work of David Lyon on surveillance, which we will compare with various other viewpoints,
ranging from more individualist perspectives to a more social-oriented analyses. We join a qualitative
research methodology with a strongly empirical concern to develop a comprehensive understanding
of the real-time experience of employees in the field. The study is also exploratory in nature in that
it tries to unravel the underlying reasons and motivations of particular patterns of behaviour and
attitude patterns on a a given issue. We adopt phenomenography as our general-background
approach. The insights gained through these methods and techniques will be made available for
critical scrutiny and enable us to derive adequate and substantial conclusions. Finally, we will
consider how our findings about the social consequences of workplace surveillance relate to the work
anthropology and ethics of the Catholic Church (with a focus on its official teaching on work). The
insights gained through these methods and techniques will be made available for critical scrutiny
and, as we have said, enable us to derive adequate and substantial conclusions. The quality of work
life, of which there are many perspectives in various contexts, generally comprises that which
promotes the good life or well-being of the worker. Since employees are placed in “an unrivalled
position when understanding the world of work”43 and discussions have to be “essentially employee-
centered and focus exclusively on what is beneficial for the worker,”44 we concentrate in this research
on employee accounts, experiences and perspectives.
OUTLINE OF THE STUDY
The first part of the study (chapters one and two) borrows from the field of technology and its socio-
cultural background. We consider the background and impacts of various digital technologies used
in workplace surveillance: their means, extents, forms and goals. We follow this with an examination
42 Patricia M. Shields and Nandhini Rangarajan, A Playbook for Research Methods: Integrating Conceptual
Frameworks and Project Management (Stillwater, OK: New Forums Press, 2013), 109-158; Craig L. Brains,
Jarol B. Manheim, Lars B. Willnat and Richard C. Rich. Empirical Political Analysis, 8th ed. (Boston, MA:
Longman. 2011), 76. 43 Z. Nadiyah Hannif, “Job Quality in Call Centres: Key Issues, Insights and Gaps in the Literature,” 6th Global
Conference on Business and Economics (GCBE) Proceedings, 1-13 (Lynchburg USA: Association for
Business and Economics Research, 2006), 2. 44 Hannif, “Job Quality in Call Centres,” 2.
General Introduction
9
of various perspectives and frameworks on monitoring. The first chapter succinctly conceptualizes
and examines the ways and means of surveillance in the workplace as well as the impact of these on
employees. Given the importance of explorations of the nature of surveillance in the workplace in
this technocratic context, we also pose several key questions here, including how surveillance came
to be seen as a ‘normal’ phenomenon and how its use engenders or endangers organizational
behaviour and decision making. The second chapter highlights, from a uniquely Indian work-culture
perspective, themes like the progressive flexibilization of labour; new organizational environments
with their new dynamic engagements; the reinvention of old and invention of new management
styles; and workplace surveillance and implications. Most importantly, it explores socio-ethical
issues faced by employees due to ubiquitous surveillance practices used in the organizational
workplace.
The second part of this research concentrates first on privacy issues (chapter three), which are more
individual in nature, and second on a wide range of social conundrums, which have not yet been
sufficiently plotted in research on workplace surveillance from an employee perspective (chapter
four). The third chapter approaches the concept of privacy from a variety of angles, considering the
views of both its contemporary advocates and critics. The problems of data mining, identity theft and
cyber bullying that endangers the privacy and autonomy of the employee are all evaluated, along
with growing concerns about electronic ‘exhibitionism and voyeurism.’ In addition, this chapter
focuses on privacy issues in Indian organizational workplaces and call centers in particular. The
fourth chapter examines and explores the more social problem that organizational surveillance leads
to a widening of social distance (adopting a social justice approach). Our argument in this chapter is
developed in dialogue with David Lyon’s conception of surveillance as “social sorting:” Lyon
discusses how the subordination of workers leads to alienation and often dehumanization, and how
it can jeopardize an employee’s reputation. We will also here consider and assess Foucault’s concept
of a “disciplinary society,” according to which persons are “normalized” by their categorical
locations, and Deleuze’s notion of a “society of control,” where people are forced to live in
circumscribed parameters, seeking to go beyond both of these views.
In chapter five, we undertake an empirical investigation of workplace surveillance technologies in
an effort to confirm what has been explored and discussed in previous chapters primarily through
textual studies. This chapter presents and analyses the results of a brief survey we have conducted
online with employees working in BPOs and in information technology-enabled services, and in this
way seeks to more fully understand the employees’ real-time experience of electronic surveillance
in the workplace. This survey asked employees to describe their feelings about working under 24/7
electronic surveillance/monitoring at work. It takes phenomenography as its approach, seeking to
describe and analyse the data collected through open and semi-closed online questionnaires. It aims
to derive additional information on how surveillance in the workplace forms and alters behavioural
tendencies. The overall objective of the study is to discover, from employees’ perspectives, the
adverse effects of electronic monitoring on their attitude, job commitment and satisfaction, and
morale and behaviour.
The third part of this research aims to integrate ethical principles and practices relevant to workplace
surveillance (chapter six) and propose an ethical framework and managerial paradigm (chapter
seven) in the light of the preceding explorations. The sixth chapter again consider the relationship
between workplace behaviours and ethics and identifies several moral behaviours that go beyond
managerial rationality. This section aims to develop a general moral framework to understand and
ethically respond to electronic monitoring and treats ethics as an open-ended, integrated force in
employee management. This demands an ethical rethinking of workplace surveillance and
managerial behaviour. It also calls for consideration of how different technological surveillances in
General Introduction
10
the workplace can be detrimental to an open culture of trust, organizational motivation and social
commitment. After analysing several corporate codes of ethics and various theoretical approaches of
moral assessment, the chapter presents an integrated, alternative approach – a balanced, tripartite
approach – to the task of ethically assessing workplace surveillance. Equipped with this approach of
moral integration, we emphasize the need for personal/moral integrity by drawing on the human
nature approach of Patricia Werhane as well as on the principle of human dignity and ideology of
the subjectivity of work upheld by Pope John Paul II. The chapter also integrates an embedded
religious frame of reference in the study of workplace behaviour and employee management.
The final chapter aims to articulate an alternative framework for thinking about workplace behaviour
and employee management, one that changes how members of an organization tend to think and act.
By integrating managerial strategies and ethics, we respond to the challenges raised by the practice
of workplace surveillance from a humanistic, person-centered perspective, which will in turn mark a
Christian contribution to the debate. This alternative approach aims to ensure that employees’ voices
are heard and to stimulate the capacity to alter both managerial and employee behaviours. Thus, this
section introduces a person-centered managerial paradigm, with its labourer-valued management and
preference for self-monitoring. This approach prioritizes the human character of employees without
neglecting the role played by managerial rules and moral norms. It offers a humanistic, personalist
alternative to economistic conceptions of workplace behaviour, one which we argue opens up a new
direction in workplace surveillance studies. A pictorial representation (Figure 1) of the structure of
this research is given below to enable a better understanding of its evolution and progression.
Figure 1 Evolution and Progress
This schme explains progression of the research in line with the primary question: does workplace
surveillance ethically endangers the individual rights of employees and creates new social issues.
This question has been the starting point of this research and driven its evolution, progression and a
final appraisal.
Part One Part Two Part Three
Surveillance:
Meaning, Systems &
Technologies
Individual Rights
Perspective:
Privacy Invasion
Indian Context:
Socio-Cultural &
Economic Scenarios
Integrated Ethical
(Tripartite) Response
with Strategic
Interactive Management
Model (LVM & Self-
Monitoring)
Social Impacts
Perspective: Social
Sorting & Power
Distance
Socio-Economic
& Ethical
Challenges
A Qualitative
Conformation
(Empirical Study)
CHAPTER ONE
TECHNOLOGY REVISITED: TOWARDS REPRESENTATIONAL PRACTICES OF
SURVEILLANCE
1.0 INTRODUCTION
The convergence of computer-internet technologies and telecommunication methods has given rise
to new ways and means for the surveillance of people as citizens, workers and consumers. This has
had a dramatic effect on our society per se. People are forced to recognize surveillance as a necessary
part of modern society and have largely accepted it as the current norm1 and “an ever-present tool of
our modern offices.”2 Indeed, over the last two decades, the workplace has been drastically
transforming by the interpolation of new information technologies.3 Employee monitoring, which
day-by-day is seen to be more of a necessity in our widespread technological era, becomes more
controversial in its approach and complex in its appearance. It is necessary to develop an integral
understanding of both benefits and detriments of these developments. Several questions are raised
by this new technocratic context, such as: to what extent is surveillance a ‘normal’ phenomenon, and
how does its use engender or endanger organizational behaviour and decision making? This chapter
aims to provide a conceptual framework for mapping the multifaceted interactions of technology,
workplace and surveillance, following a methodology that combines descriptive, theoretical and
meta-analysis. This analytic conceptualization will provide guidance in the effort to identify some of
the underlying surveillance frameworks and to classify and examine certain current technological
devices and methods used in the workplace. Following this, we provide a set of justifications for or
against digital workplace surveillance and will further clarify the subject matter and scope of this
research.
1.1 TECHNOLOGY AND SURVEILLANCE: PRESENT LANDSCAPE
This section offers terminological clarifications and related considerations concerning both the
theory and practice of workplace surveillance. The average person who observes modern life finds
that they must steadily and speedily understand and adapt4 to technology, as technology has proven
to be the decisive factor in improved standards of living since the enlightenment and
industrialization.5 As modern life is increasingly immersed in technology, the workplace has of
course been one of the major loci (among others such as transportation, communication, health care
etc.) where technological developments over the past century have been uncritically and extensively
1 David Lyon, The Culture of Surveillance: Watching as a Way of Life (Cambridge: Polity Press, 2018), 9. Cf.
Zygmunt Bauman et al., “After Snowden: Rethinking the Impact of Surveillance,” International Political
Sociology 8 (2014): 121-144: Bernd Carsten Stahl, et al., “Electronic Monitoring in the Workplace: If People
Don’t Care, Then What is the Relevance?” in Electronic Monitoring in the Workplace: Controversies and
Solutions, ed. John Weckert, 50-78 (Hershey: Idea Group of Publishing, 2005), 64: David Murakami Wood
and C. William R. Webster, “Living in Surveillance Societies: The Normalisation of Surveillance in Europe
and the Threat of Britain’s Bad Example,” Journal of Contemporary European Research 5, no. 2 (2009):
259-273. 2 Kathy Eivazi, “Computer Use Monitoring and Privacy at Work,” Computer Law & Security Review 27 (2011):
516. 3 Lilian Mitrou and Maria Karyda, “Employees’ Privacy vs. Employers’ Security: Can They be Balanced?”
Telematics and Informatics 23 (2006): 164. 4 Peter Danielson, “Ethics of Workplace Surveillance Games,” in Electronic Monitoring in the Workplace:
Controversies and Solutions, ed. John Weckert, 19-34 (Hershey: Idea Group of Publishing, 2005), 30. 5 Philip J. Vergragt, “How Technology Could Contribute to a Sustainable World,” GTI Paper Series, (Boston:
Tellus Institute, 2006), 1.
Towards Representational Practices of Surveillance
12
applied and utilized. Given this, the workplace has been on the cutting edge of this technological
revolution. This revolution has brought an acceleration of material improvements but also of
environmental degradation and other unwanted or unintended social and ethical implications, a
circumstance which Philip J. Vergragt has called the “paradox of technological development.”6 This
persisting contradiction, in the context of the workplace where the role of technology has become a
more pressing issue, calls for a deeper exploration and comprehension of the nature of technology
and its relationship both to surveillance and to changing workplace behaviour.
1.1.1 Technology, Workplace and Surveillance: A Conceptual Analysis
People understand the term ‘technology’ differently. It is widely used to mean various scientific and
informational systems as well as tasks in connection with everyday life. The Merriam-Webster
Dictionary defines technology as “the practical application of knowledge especially in a particular
area and a capability given by the practical application of knowledge.”7 Read Bain, an American
sociologist, states that “technology includes all tools, machines, utensils, weapon, instruments,
housing, clothing, communicating and transporting devices and the skills by which we produce and
use them.”8 Elaborating on this definition, we will define technology here as the production, use, and
knowledge of tools, machines and systems in order to solve a problem or achieve a goal. More
systematically, technology can be explained as “the intelligent production of new tools, including
conceptual and ideational ones, for dealing with problematic situations.”9 These definitions show
that there is always a link between technology and human history and life. In our present post-modern
technological era, however, we experience the use of technology both in constructive and destructive
ways. It has a multitude of effects on people, society and the environment. The unexpected by-
products of technological inventions and of its multiple implementations have influenced and
impacted the values of society and raised new ethical questions.
Albert Borgmann, an American philosopher specializing in the philosophy of technology, maintains
in his analysis of a determinist view of technology – in both pessimistic and optimistic flavours –
that technology is neither good nor bad in itself; its value depends on us and our own values, which
determine whether it will be used to deserve well or ill.10 Julian Sempill likewise points out, rightly,
that technology is “not some kind of self-perpetuating, independent force, but [...] is developed and
deployed in a manner which serves and buttresses certain power relations and is, in turn, suffused
with those power relations.”11 In these ways and others, technology has been perceived in its multi-
faceted nuances and implications. Likewise, Vergragt suggests, “all human activities, like housing,
transportation, work, leisure, art and imagination, become heavily enmeshed with technology, [and
thus] we are living in a ‘culture technique’ in the sense that our deepest and most private knowledge
6 Vergragt, “How Technology Could Contribute to a Sustainable World,” 1. 7 This definition (http://www.merriam-webster.com/dictionary/technology [accessed September 20, 2015])
seems more comprehensible than the Longman Dictionary of Contemporary English, which defines
technology as “new machines, equipment, and ways of doing things that are based on modern knowledge
about science and computers” (http://www.ldoceonline.com/dictionary/technology [accessed September 20,
2015]), or that of the Oxford Dictionaries, which defines it as “the application of scientific knowledge for
practical purposes, especially in industry.”
http://www.oxforddictionaries.com/definition/english/technology [accessed September 20, 2015]. We thus
use the Merriam-Webster online Dictionary for conceptual clarification. 8 Read Bain, “Technology and State Government,” American Sociological Review 2, no. 6 (1937): 860. 9 Larry Hickman, Philosophical Tools for Technological Culture: Putting Pragmatism to Work (Bloomington:
Indiana University Press, 2001), 183. 10 Albert Borgmann, “Technology as a Cultural Force: For Alena and Griffin,” The Canadian Journal of
Sociology 31, no. 3 (2006): 353. 11 Julian Sempill, “Under the Lens: Electronic Workplace Surveillance,” Australian Journal of Labour Law
14, no.2 (2001): 113.
Towards Representational Practices of Surveillance
13
and emotions are permeated by technology.”12 The human relationship with technology, in this
respect, cannot be overestimated. Today, moreover, technological development offers the promise
of an ever-improving humanity and material improvements to standards of living. It is also obvious
that, while the future might promise a vast acceleration of technological innovation, the scale and
impact of individual, social, communitarian, and environmental degradation may also reflect this
immense increase in speed in the workplace,13 for the workplace is a major locus of human life,
where possibilities of human relationality and interaction are generated and sustained. For technology
helps the workplace to be more intensified and ever-more efficiently. The workplace becomes
increasingly fast-paced and complexly intricate, while technology changes the way it operates, often
in alarming ways.
The Merriam-Webster Dictionary defines the workplace as “a place (as a shop or factory) where
work is done.”14 In our present post-modern era of technological advancement, this idea of the
workplace has been changed dramatically: as Esposito and others suggested, “today’s workplace is
a virtual and/or physical environment, characterized by connections, collaboration and user choice,
that enables the worker to be more agile and perform activities anywhere, anytime – ultimately
creating greater enterprise value.”15 The advent of new technologies, particularly the rapid growth in
the use of information technologies in the workplace, fosters efficient and effective business around
the globe, removing the boundaries of space and time and leaving us, so to say, in a ‘digital
workplace.’16 In this new workplace, “technological change and innovations are not perceived in the
traditional neoclassical sense as random, exogenous factors but rather as an endogenous
development, because this change gives companies a competitive edge, and thus directly or indirectly
also secures or enhances positive employment development.”17 In other words, the application of
technology in the workplace has transformed the way work is done, opening up a range of new and
multi-faceted opportunities.
The use of technology reflects a change in how employees carry out their work and enables the
completion of the workload in a more effective and efficient manner.18 It is often heard that “today’s
up-and-coming generation of workers meet, share, discover and get work done via technology [...
and] people used to go to work, now work goes to people – whatever work needs to be accomplished,
anytime it needs to get done, on a multitude of devices.”19 Technology, on the one hand, undoubtedly
12 Vergragt, How Technology Could Contribute to a Sustainable World, 2. 13 Vergragt, How Technology Could Contribute to a Sustainable World, 1. 14 The workplace is traditionally viewed as the physical location where someone works and earns his living.
http://www.merriam-webster.com/dictionary/workplace [accessed September 22, 2015]. 15 Richard Esposito, Carl J. Kraenzel, Christopher G. Pepin, and Antony I. Stein, “The New Workplace: Are
You Ready? How to Capture Business Value?” IBM Global Technological Services (2011), 2. This is well
illustrated by researchers like Sebastian Köffer and Wayne F. Cascio. Cf. Sebastian Köffer, “Designing the
Digital Workplace of the Future – What Scholars Recommend to Practitioners,” Thirty Sixth International
Conference on Information Systems, Fort Worth, 2015, 1-21; Wayne F. Cascio, “Managing A Virtual
Workplace,” Academy of Management Executive 14, no. 3 (2000): 81-90. 16 The digital workplace comprises the employee’s technological working environment. It encompasses all the
technologies the employee uses to get work done in today’s workplace. Today, as the workplace continues to
evolve, and employee expectations shift, and many believe that organizations that do not embrace the digital
workplace risk falling behind. Mike Harm, “Building the Factory of the Future with Digital Workplace,”
Industry Today 21, no. 2 (2018): 6-21: Amy Colbert, Nick Yee and Gerard George, “The Digital Workforce
and the Workplace of the Future,” Academy of Management Journal 59, no. 3 (2016): 731-739. 17 Miroslav Beblavy, Ilaria Maselli, and Elisa Martellucci, “Workplace Innovation and Technological Change,”
Center for European Policy Studies (2012): 34. 18 Ken Simpson and Marta Byrski, “The 21st Century Workplace: How Personal Technologies Can Make a
Difference,” Asia Pacific Journal of Business and Management 1, no. 2 (2010): 21. 19 Esposito et al., “The New Workplace: Are You Ready? How?” 4. Though new workplace trends offer ample
opportunities for the use of technology in the workplace and further cause for the relative change of working
Towards Representational Practices of Surveillance
14
provides companies and any organizational workplace with new opportunities for improving work
performance and the security of their premises, yet on the other hand it presents new potential threats
to the manual labour force and can even pose higher security threats, which often outweigh the
benefits technology provides.20 For technology has brought with it a great many challenges for
organizational behaviour, from the perspective of both employee and employer and in the
organizational structure as a whole.
Widespread automation in the workplace has been successful both in enhancing workplace
performance and adding considerable sophistication to the monitoring and tracking of employee
behaviour.21 Information technology (IT) refers to devices used in the creation, storage,
manipulation, exchange, and dissemination of data, sound, and/or images.22 As the cost of IT devices
continues to fall, and its capabilities continue to increase, people are making greater use of IT in their
everyday lives. Nevertheless, as IT has increasingly come to be used in the workplace for monitoring
purposes, employers keep employees incessantly under a watchful eye. When this surveillance is
intrusive in nature, employees are often led to feel provoked and defensive. In this way, they threaten
the corporate culture and generate opposite effects to those intended by their managers, who
introduce the new surveillance technologies.23 The Privacy Foundation,24 however, in its Workplace
Surveillance Project, has reported that today, globally, 35% of the 100 million online members of
the workforce are monitored.25 Surveillance has, thus, eventually become “components of modern
information systems and the modern work environment” and is viewed as “a ‘value added’ element
of information systems, as designers are often required to design technology, which will capture,
analyse and disclose personal information.”26
Surveillance, according to the Merriam-Webster Dictionary, is the act of carefully watching someone
or something especially in order to prevent or detect a crime.27 The word surveillance originates from
the French term for “watching over,” in which “sur” means “from above” and “veiller” means “to
watch.”28 It is observation from a distance. It is a well “focused, systematic and routine attention to
habits, these pose important challenges for their implementation as well. Some of the challenges identified in
researches (Esposito et al. 2011, 4) are: (1) the complexity of devices, where there are more devices there
more applications to support, more systems to coordinate and more connections to maintain; (2) security and
compliance, where there is more assurance of data security and compliance with various regulatory, corporate
and government rules; (3) cost management to supply enough infrastructure; (4) loss of control in delivering
services to a larger number of devices; and (5) support given to the workers who use these devices. 20 By “technology” we mean, for the purpose of this paper, information and communication technology. We
thus for the most part lead aide questions concerning biological technologies (e.g., genetic analysis). 21 Simpson and Byrski. “The 21st Century Workplace,” 21. 22 Michael J. Quinn, Ethics for the Information Age, 5th ed. (Boston, MA: Pearson, 2012), 38. 23 Simpson and Byrski, “The 21st Century Workplace,” 22. 24 The Privacy Foundation of Sturm College of Law at the University of Denver, Colorado conducts
international employee monitoring research. A systematic research on The Extent of Systematic Monitoring
of Employee E-mail and Internet Use is directed by Andrew Schulman under the Workplace Surveillance
Project of Privacy Foundation in 2001. See, http://www.sonic.net/~undoc/extent.htm [accessed October 15,
2015]. 25 Joseph Migga Kizza and Jackline Ssanyu, “Workplace Surveillance,” in Electronic Monitoring in the
Workplace: Controversies and Solutions, ed. John Weckert, 1-18 (Hershey: Idea Group Publishing, 2005), 2. 26 Lilian Mitrou and Maria Karyda, “Employees’ Privacy vs. Employers’ Security: Can They Be Balanced?”
Telematics and Informatics 23 (2006): 165. 27 “Surveillance,” http://www.merriam-webster.com/dictionary/surveillance [accessed September 20, 2015]. 28 Marvin Minsky, Ray Kurzweil, and Steve Mann, “The Society of Intelligent Veillance,” International
Symposium on Technology and Society (ISTAS), 2013, 14. The inverse (reciprocal) of surveillance (surveilling
the surveillers) is called ‘sousveillance’ that comes from the French terms “sous” (below) and “veiller” (to
watch), enabling a panoptic gaze directed at those in authority. Sousveillance, according to Steve Mann, is a
form of “reflectionism” that “seeks to increase the equality between surveiller and the person being surveilled
Towards Representational Practices of Surveillance
15
personal details for purposes of influence, management, protection or direction, and which directs its
attention in the end to individuals.”29 It is the fact or possibility of being observed by someone else.30
Surveillance could be thought of as “systematic attention to a person’s life aimed at exerting
influence over it.”31 In this vein, the word surveillance covers surreptitious investigations both into
individual activities and routine/everyday activities. Yet, because of its intriguing and highly
sensitive character, surveillance is very ambiguous in nature32 and is called by Graham Sewell and
James R. Barker a ‘double-edged sword,’33 which carries baggage along with its benefits.34 In this
respect, electronic surveillance, which is our main concern here, is generally understood as the
gathering of information by surreptitious, secret and stealthy means using electronic devices. It is an
inconspicuous observation of or snooping on persons, places and activities using electronic devices
such as cameras, microphones, tape recorders, or wire-taps, and more intrudingly by monitoring of
internet, email, and other web activities.35 Workplace surveillance also refers to the intended
activities of observation to collect and record employees’ data and information, often done either in
a systematic or an ad hoc way by using electronic and other technological means.36
In the work context, surveillance refers to “management’s ability to monitor, record and track
employee performance, behaviours and personal characteristics in real time (for example, Internet or
telephone monitoring) or as part of broader organizational process.”37 Corey A. Ciocchetti classifies
surveillance practices as: (1) best practices representing the greatest protection and least invasion of
privacy, (2) risky practices offering low protection and minimal attacks on privacy, (3) borderline
practices providing high protection yet a highly insidious and sinister approach to privacy, and (4)
poor practices affording low protection and an extreme invasion of privacy.38 Though this
classification likely assists in balancing employer-employee interest alike, when it comes in the
matter of legality, it is still disturbing with regard to individual rights and interests. It remains an
open question whether electronic surveillance in the workplace is ultimately beneficial to an
(surveillee), including enabling the surveillee to surveil the surveiller.” Steve Mann, Jason Nolan, and Barry
Wellman, “Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in
Surveillance Environments,” Surveillance & Society 1, no. 3 (2003): 332-333. 29 David Lyon, Surveillance Studies: An Overview (Cambridge: Polity Press, 2007), 14. For Lyon, surveillance
is focused, means intentionally employed with a purpose. By systematic, he means that attention to personal
details is not random, occasional or spontaneous; it is deliberate and depends on certain protocols and
techniques. This surveillance is routine in that it occurs as a normal part of everyday life in all societies. 30 D. Beu and M. R. Buckley, “The Hypothesized Relationship between Accountability and Ethical Behaviour,”
Journal of Business Ethics 34 (2001): 57-73. Stahl et al., “Electronic Monitoring in the Workplace,” 50-78. 31 James B. Rule, Douglas McAdam, Linda Stearns and David Uglow, “Documentary Identification and Mass
Surveillance in the United States,” Social Problems 31, no. 2 (1983): 223. 32 David Lyon, Surveillance Studies: An Overview (Cambridge: Polity Press, 2007), 14-18. 33 Graham Sewell and James R. Barker, “Coercion versus Care: Using Irony to Make Sense of Organizational
Surveillance,” Academy of Management Review 31, no. 4 (2006): 934. For Sewell and Barker, this
development is a double-edged sword because of its protective nature (disruptive or deviant acts of others)
on the one hand, and the challenging results of its extremes (for example the challenge to civil rights
concerning privacy and self-determination) on the other side. Sewell and Barker, “Coercion versus Care,”
934. 34 Eivazi, “Computer Use Monitoring and Privacy at Work,” 517. 35 Along with the expressions of electronic surveillance or monitoring, words such as spying, snooping,
electronic spying, sneaking, espionage, prying, and Big Brother are used to mean the same in a workplace
context. It is surprising to see that these consistent language choices in writings reflect a negative attitude
towards electronic surveillance. 36 Mitrou and Karyda, “Employees’ Privacy vs. Employers’ Security: Can They Be Balanced,” 165. 37 Kirstie Ball, “Workplace Surveillance: An Overview,” Labour History 51, no. 1 (2010): 87. A similar
definition is found also in: Jonathan P. West and James S. Bowman, “Electronic Surveillance at Work: An
Ethical Analysis,” Administration & Society 48, no. 5 (2016): 628. 38 Corey A. Ciocchetti, “The Eavesdropping Employer: A Twenty-First Century Framework for Employee
Monitoring,” American Business Law Journal 48 (2011): 289.
Towards Representational Practices of Surveillance
16
organization. Michael J. Quinn writes that “there is evidence that employee monitoring makes
employees more focused on their tasks, but also reduces job satisfaction.”39 In this respect, Kizza and
Ssanyu rightly observe that “employee monitoring is a dependable, capable and a very affordable
process of electronically recording all employee activities, and the internet and its associated
technologies have accelerated the monitoring processes, substantially making them more evasive and
intrusive.”40 For example, if a company decides to do so, it can track any number of calls its
employees handle, document its employees’ number of keystrokes per minute, view their website
usages (duration and type), and read and assess email communications.41 Given this high incidence
of workplace electronic monitoring, it is important to consider it more closely and assess its influence
and impact on the employees, employment relationships, and organizations at large.
1.1.2 Surveillance as Part of Organizational Behaviour
Gary T Marx, who holds a functional view of general surveillance in the society, interprets it as one
of societies’ functional prerequisites for its existence, and maintains there is nothing really new in
it.42 There is indeed a common tendency to perceive workplace surveillance as a required and even
indispensable part of organizational behaviour for its existence, sustenance, and growth. A detailed
analysis of this changing general response of contemporary surveillance, as part of organizational
behaviour (OB) perspective, is indispensable if we want an impartial and critical understanding of
its practices in the workplace, “as we live in a time of revolutionary change with respect to the
crossing of personal and social borders.”43 For on the one hand, employees “are social creatures and
as such, are concerned with their relationships with others and influenced by what others say and do,
[... and] are concerned about fairness and justice,” and on the other hand, “organizations as
institutions in their own right are also embedded in a social context.”44 Marx underlines this in a
remark that is strikingly innovative, though not philanthropic: that “surveillance is also applied to
contexts (geographical places and spaces, particular time periods, networks, systems and categories
of person), not just to a particular person whose identity is known beforehand.”45 Referring to the
scope of this research: OB is best defined as “an academic discipline that is concerned with
describing, understanding, predicting, and controlling human behaviour in an organizational
environment.”46 It is the way in which individuals and groups work within an organization.
39 Quinn, Ethics for the Information Age, 462. 40 Kizza and Ssanyu, “Workplace Surveillance,” 2. 41 Quinn, Ethics for the Information Age, 37. The 2007 study by the American Management Association about
monitoring reminds us that monitoring has become commonplace in the workplace. As the survey shows,
66% of employers monitor employees’ website activities; 43% review their employees’ emails; 40% analyse
other communications; and 45% monitor audio calls. American Management Association, “2007 Electronic
Monitoring & Surveillance Survey,” American Management Association (AMA) and The ePolicy Institute
(AMA/ePolicy Institute Research), New York, 2007. The detailed summary of the result of the survey is
published online in:
http://www.plattgroupllc.com/jun08/2007ElectronicMonitoringSurveillanceSurvey.pdf [accessed September
22, 2015]. 42 Gary T. Marx, “What’s New about the ‘New Surveillance’? Classifying for Change and Continuity,” in The
Surveillance Studies Reader, ed. Sean P. Hier and Josh Greenberg (New York: McGraw-Hill, 2007), 84. 43 Marx, “What’s New about the ‘New Surveillance’?” 84. 44 Jeffrey Pfeffer, “Human Resources from an Organizational Behaviour Perspective: Some Paradoxes
Explained,” The Journal of Economic Perspectives 21, no. 4 (2007): 120. 45 Marx, “What’s New about the ‘New Surveillance’?” 84. Marx also interestingly notes that “the use of
‘contexts’ along with ‘individuals’ recognizes that much modern surveillance also looks at settings and
patterns of relationships.” Marx, “What’s New about the ‘New Surveillance’?” 85. 46 Steven Altman, Enzo Valenzi and Richard M. Hodgetts, Organizational Behaviour: Theory and Practice
(Orlando: Elsevier [first publisher: Academic Press, INC, 1985], 2013), 4.
Towards Representational Practices of Surveillance
17
OB is not “a defined business function or area of responsibility similar to finance or marketing,” but
rather “a set of insights and tools that all managers can use to carry out their jobs more effectively.”47
It also involves behaviours that enhance, motivate and maintain a supportive and sustaining socio-
psychological environment.48 “When applied to individuals and groups, it includes norms, values,
perceptions, attitudes, and a series of other behavioural determinants,”49 all of which are important
in the discussion of organizational surveillance practices. It is significant also because the
organizational behaviour includes realms of employee motivation, conflict resolution and
performance evaluation.50 Surveillance is also said to be a task-oriented behaviour that enables
employers to obtain information about employee performance.51 As such, surveillance seems quite
positive insofar as it can increase performance and productivity. However, situational or internal
factors such as organizational culture, procedures or structures all constitute the organizational
behaviour52 in such a way as to determine the behavioural attitudes of managers toward their
employees, and vice versa.
For instance, Niehoff and Moorman, referring to the taxonomy of work-related supervisory
behaviours developed by Komaki and others, categorise and separate supervision or monitoring into:
“(1) performance antecedents (instruction, clarifying work), (2) performance monitors, and (3)
performance consequences (evaluation, giving rewards).”53 Although their analysis finds that
employees who were monitored more were more successful than those who were monitored less,
they also find, alarmingly, among those who were monitored more, a direct decrease in
organizational citizenship behaviour, “defined as extra-role54 behaviour that is discretionary and not
explicitly related to the formal reward system of an organization but is conducive to its effective
functioning.”55 These issues of organizational citizenship and the ‘curtailed extra-role behaviour’
will be discussed in the later part of the research. This research agrees that the implementation of
surveillance technologies and its routine utilization, linking it to the organizational behaviour or to
the management strategy to increase employer control, in turn felt by employees as low-trust
practices and likely to be counterproductive and affects the active human resource management.
47 Ricky Griffin and Gregory Moorhead, Organizational Behaviour: Managing People and Organizations, 7th
ed. (South-Western, Mason, OH: Cengage Learning, 2014), 6. 48 Stefanie E. Naumann, “The Effects of Norms and Self-Monitoring on Helping Behaviour,” Journal of
Business Behavioural Studies 2 (2010): 2. Cf. D. W. Organ, “Organizational Citizenship Behaviour: It’s
Construct Clean-up Time,” Human Performance, 10 (1997): 85-97; W.C. Borman and S. J. Motowidlo,
“Expanding the Criterion Domain to Include Elements of Contextual Performance,” in Personnel selection
in organizations, ed. N. Schmitt, W. C. Borman, & Associates (San Francisco: Jossey-Bass, 1993), 71-98. 49 Altman, Valenzi and Hodgetts, Organizational Behaviour: Theory and Practice, 4. 50 Griffin and Moorhead, Organizational Behaviour, 7. 51 Brian P. Niehoff and Robert H. Moorman, “Justice as a Mediator of the Relationship between Methods of
Monitoring and Organizational Citizenship Behaviour,” Academy of Management Journal 36, no. 3 (1993):
527. 52 Ronald R. Sims, Managing Organizational Behaviour (Westport, London: Quorum Books, 2002), 8. 53 Niehoff and Moorman, “Justice as a Mediator of the Relationship between Methods of Monitoring and
Organizational Citizenship Behaviour,” 528. See for instance, J. L. Komaki, S. Slotnick, and M. Jensen,
“Development of an Operant-Based Taxonomy and Observational Index of Supervising Behaviours, Journal
of Applied Psychology 71 (1986): 260-269. 54 The in-role behaviour of employee (or employer) is “the necessary or the expected behaviour for the
accomplishment of job duties,” whereas the “extra-role behaviour refers to the collection of a series of actions
that are not included in the statement of work or related to the employee’s position or the role in the
organization.” Yanhan Zhu, “Individual Behaviour: In-role and Extra-role,” International Journal of Business
Administration 4, no. 1 (2013): 23. 55 Niehoff and Moorman, “Justice as a Mediator of the Relationship between Methods of Monitoring and
Organizational Citizenship Behaviour,” 529.
Towards Representational Practices of Surveillance
18
1.1.3 Traditional versus Contemporary Electronic (& Cyber) Surveillance
In the period following the Industrial Revolution, controls exercised in the workplace have been
called ‘surveillance.’56 Today, surveillance, which is augmented with computerization in every field
of human life, has become an intrinsic part of life because, people experience an upsurge in the way
their personal data and information are accessed, collected and stored through various systems due
to increased use of information technology in the workplace.57 This surveillance, according to David
Lyon, is Janus faced.58 For, although employee surveillance in today’s tech-culture is presented as a
fait accompli,59 and there has been an explosion in the use and application of various technological
devices and means in today’s work culture, the haunting fact is that employee monitoring has been
customary and prevalent in one or another form for as long as there has been employment, and has
produced various, sometimes complex results.60 Though management espouses empowerment and
job enlargement, others claim that the process of surveillance reduces employees “to being cogs in a
machine like the old-fashioned assembly line.”61 The diverse dynamics of both traditional and current
surveillance practices can be illustrated by the following observation, which will help the reader
understand the complexities that the workforce faces in present day technocratic culture.
Traditionally, for instance, employers used to monitor the time of arrival and departure of employees
by simple observation, and what any particular employee does at any given time by informal visits.
Today, different timings related to employees’ presence on work premises are recorded automatically
and produce objective data about them.62 What is new in these newer surveillance practices is that
surveillance now progressively depends more on information and communication technologies.
Today, almost all jobs, and some jobs more intensely than others, are subjected or have the potential
to be subjected to several types of electronic or other surveillance practices.63 This tendency of using
and applying increasingly marked surveillance practices intensified after the 1960s and has been
enabled by the large-scale computerization of the workplace.64 This is even marked by the shift in
the nature of work and the society at large, for example in the move from agricultural work to an
industrial-manufacturing society, and to today’s knowledge-based information and communication-
related work culture. The knowledge and the control that workers have formerly possessed over their
work is now removed from them and is organized and overseen scientifically by the manager. In this
way, the work is executed and rationalized into discrete piecework.65
56 David Lyon, The Electronic Eye: The Rise of Surveillance Society (Cambridge: Polity, 1994), 34. See also,
N. Ben Fairweather, “Surveillance in Employment: The Case of Teleworking,” Journal of Business Ethics 22
(1999): 40. 57 Sylvia Kierkegaard, “Privacy in Electronic Communication, Watch Your E-mail: Your Boss is Snooping,”
Computer Law & Security Report 21 (2005): 229. 58 David Lyon, “Surveillance Technology and Surveillance Society,” in Modernity and Technology, eds.
Thomas J. Misa, Philip Brey and Andrew Feenberg (Cambridge: The MIT Press, 2003), 168. 59 Kizza and Ssanyu, “Workplace Surveillance,” 15. 60 Delbert M. Nebeker and B. Charles Tatum, “The Effects of Computer Monitoring, Standards and Rewards
on Work Performance, Job Satisfaction and Stress,” Journal of Applied Social Psychology 23, no. 7 (1993):
508. 61 Marlene C. Piturro, “Employee Performance Monitoring... Or Meddling?” Management Review 78, no. 5
(1989): 32. 62 Fairweather, “Surveillance in Employment,” 40. 63 Michaela Vorvoreanu and Carl H. Baton, “Examining Electronic Surveillance in the Workplace: A Review
of Theoretical Perspectives and Research Findings,” Paper from Conference of the International
Communication Association, June 2000, (Acapulco, Mexico), 6. 64 Lyon, “Surveillance Technology and Surveillance Society,” 168. 65 Harry Braverman, Labour and Monopoly Capital: The Degradation of Work in the Twentieth Century (New
York: NYU Press, 1998), 80-82.
Towards Representational Practices of Surveillance
19
In this same line of thought, managers were traditionally not able to attend to and monitor all workers,
as the proportion of time given to it was comparatively less than that given to their other
responsibilities.66 However, Roland E. Kidwell Jr. and Nathan Bennett observe that unlike traditional
practices, monitoring with electronic and other modern (cyber) devices and methods allow constant
and immediate surveillance with an instant control of employee behaviour.67 Jeffrey Stanton also
stresses this idea, saying, “electronic monitoring can occur continuously, can measure multiple
employees simultaneously, and can record voluminous data especially on quantitative dimensions of
work performance, [whereas] traditional supervisory monitoring usually relies upon the inconstant
presence of a human observer with the many known limitations of perceptual processing and
memory.”68 Moreover, as Laura Lally explains, “the availability of technology based access may
even lead decision makers to seek out information they would not have asked for in person.”69 In the
same vein, one of the greatest differentiating factors between traditional and newer electronic or
cyber monitoring is that earlier workers knew when the boss was present, yet today’s workers often
do not; electronic monitoring can be there all the time.70 A digital sentinel, a ‘Big Brother,’ is always
there, working with everyone as unchecked surveillance exacerbates and continues. We can thus say
that computer-based surveillance is both increasingly powerful and impersonal yet also decreasingly
visible and anonymous.71 Analysing the cost per unit of data surveilled, the traditional methods are
more expensive than new ways and means applied in the same situation, as the traditional methods
often require a separate action while the newer methods are merged with routine activity.72
It is also said that in both traditional and contemporary electronic or cyber surveillance practices,
monitoring “can occur regularly or intermittently, can be expected or unexpected, [and] can occur
with or without employee acceptance or permission.”73 However, the so-called characteristics of fair
procedures of monitoring, which we will explain later in our discussion of surveillance frameworks,
such as consistency, accuracy, control and justification may differ between both traditional and
electronic or cyber-monitoring environments.74 For instance, to summarise, traditional practices tend
to entail face-to-face control, complete disclosure of the doer’s identity, monitoring limited mainly
to working hours alone, experiencing home (outside work premises) as a safe haven, explicit
visibility of the effect on the victim, and having little in the way of an audience. In contrast, the
present electronic or online (cyber) surveillance practices are characterised by their mechanical
nature (with electronic devices), the anonymity of the perpetrator, continuous and extensive
occurrences (24/7 through GPS – and no escape), the invisibility of effects, an unlimited audience,
and a hasty and viral reach. Exhibit-1 below charts these differences.
66 J.R. Aiello, “Computer-Based Work Monitoring: Electronic Surveillance and its Effects,” Journal of Applied
Social Psychology 23 (1993): 499-507. 67 Roland E. Kidwell Jr. and Nathan Bennett, “Electronic Surveillance as Employee Control: A Procedural
Justice Interpretation,” The Journal of High Technology Management Research 5, no. 1 (1994): 43. 68 Jeffrey M. Stanton, “Traditional and Electronic Monitoring from an Organizational Justice Perspective,”
Journal of Business and Psychology 15, no. 1 (2000): 130. 69 Laura Lally, “Privacy versus Accessibility: The Impact of Situationally Conditioned Belief,” Journal of
Business Ethics 15, no. 11 (1996): 1222-1223. 70 Joseph H. Wen and Pamela Gershuny, “Computer Based Monitoring in the American Workplace:
Surveillance Technologies and Legal Challenges,” Human Systems Management 24, no. 2, (2005): 165-173. 71 Brian L. Zirkle and William G. Staples, “Negotiating Workplace Surveillance,” in Electronic Monitoring in
the Workplace: Controversies and Solutions, ed. John Weckert, 79-100 (Hershey: Idea Group Publishing,
2005), 80. Cf. Lyon, “Surveillance Technology and Surveillance Society,” 164; Gary T. Marx, Undercover:
Police Surveillance in America (Berkeley: University of California Press, 1988), 206-234. 72 Marx, “What’s New about the ‘New Surveillance’?” 87. 73 Stanton, “Traditional and Electronic Monitoring from an Organizational Justice Perspective,” 131. 74 Stanton, “Traditional and Electronic Monitoring from an Organizational Justice Perspective,” 134.
Towards Representational Practices of Surveillance
20
Traditional Monitoring Practices Present Electronic (Cyber) Surveillance
Face-to-face control Mechanical (electronic devices)
More expensive Less expensive
Close observation Remote observation
Doer is known Perpetrator is often anonymous
During working hours (on-the-job) Monitored 24/7 (on/off-the-job)
Home as a safe haven No safe haven (GPS, RFID)
Difficult data analysis processes Easier data analysis processes
Effect on victim is visible Effects are invisible
Limited audience Unlimited audience, viral reach
Exhibit-1 Differences in traditional and present workplace surveillance
Therefore, although employee monitoring is not a new phenomenon, the possibility of doing it
without human intervention or interruption is relatively new,75 and it permits “remote access and fast
dissemination of information”76 and offers remarkable speed in processing and assorted opportunities
in application, saving both cost and time.77 As Exhibit-1 shows, one of the advantages of ‘new’
surveillance practices is their ability, on the one hand, to carry out the monitoring from ‘afar’ over
the ‘close’ observation of the ‘traditional’ practices, and on the other hand, to go beyond the sensual
perception and “see through”78 people and situations. The disproportionate availability of
technology,79 which was only available to the elite in the past, is today widely accessible and easy to
use. It is the same with the process of data analysis: present surveillance practices have greater
capacity and data is much easier to organize, store, retrieve, analyse, and communicate (send and
receive).80 In sum, surveillance is nothing new in itself, but its nature is changing and present means
of surveillance, though they have not entirely replaced more traditional methods, have certainly
supplemented them in very transformative ways.
1.1.4 Workplace Surveillance Acts and Other Federal, Constitutional Policies
The prevailing legal uncertainty about the proper balance between the heights and limits of the extent
of surveillance practices and the use of its means and methods often functions as a constraint on this
discussion. The foreseen and the actual tension lies between the rights of the employer, such as
property rights, and the right of the members of the organization, or in other words the employee,
especially the right to privacy.81 However, in some places there is a mixture of federal and state laws,
which are used globally and locally, and even constitutional provisions to institute some boundaries
for the implementation of surveillance practices, which prohibit unauthorized access to persons and
data.82 But this most often function to eventually guarantee employers relative freedom to monitor
75 Mitrou and Karyda, “Employees’ Privacy vs. Employers’ Security,” 164-178. 76 Lally, “Privacy versus Accessibility: The Impact of Situationally Conditioned Belief,” 1222. 77 Kathy Eivazi, “Computer Use Monitoring and Privacy at Work,” Computer Law & Security Review 27
(2011): 516. 78 As Gary T. Marx opines, “indeed ‘seeing through’ is a convenient short hand for the new surveillance.”
Marx, “What’s New about the ‘New Surveillance’?” 85. 79 Marx, “What’s New about the ‘New Surveillance’?” 87. 80 Marx, “What’s New about the ‘New Surveillance’?” 88. 81 Patricia Findlay and Alan McKinlay, “Surveillance, Electronic Communications Technologies and
Regulation,” Industrial Relations Journal 34 (2003): 305-318. 82 Sonny S. Ariss, “Computer Monitoring: Benefits and Pitfalls Facing Management,” Information &
Management 39 (2002): 553-558.
Towards Representational Practices of Surveillance
21
and snoop into the private lives of potential or current employees.83 Likewise, delays in the passage
of relevant legislation about the extent of justified use of available technologies often lead to
unconditional breakthroughs in surveillance practices. It is thus all the more important and vital for
top-level managers and company leaders in today’s multi-faceted workplace to familiarize
themselves with traditional employment laws, as well as laws that affect present social media policies
and regulations. For, the emergence and perpetuation of complexities and conflicts in various rights
and interests play a major role in determining any actual action regarding surveillance.
In the U.S., the National Labour Relations Act (NLRA)84 addresses union and non-union employee
rights in regard to the use of social media and acceptable social media policy, and consequently seeks
to ensure employee information protection. Likewise, the new Federal Trade Commission (FTC)
guidelines provide regulations for the endorsement of products on social media sites; collecting and
processing sensitive employee information and publishing it online or using it for other purposes,
and establishing legal responsibility to take steps to properly secure them.85 In the same vein, the
Federal Employee Polygraph Protection Act of 1988 bars employers from using polygraphs (lie
detector), one of the traditional methods of determining employees’ veracity.86 The Electronic
Communications Privacy Act of 1986 (ECPA),87 in a law governing wiretapping and electronic
eavesdropping, makes the interception and monitoring of electronic communications unlawful.88
Nevertheless, it allows for significant exceptions under the banner of a consent exception (if one
party in communication gives consent), a course of business exception (by equipment used in the
normal course of business), a provider exception (the provider can retrieve the information stored in
the system), etc.89 The Computer Fraud and Abuse Act (CFAA), enacted in 1986 as an amendment
to the then-existing computer fraud law, prohibits knowingly access[ing] a computer without
authorization or exceeding authorized access.”90 This means that when computer access goes beyond
83 Three responses are possible to the dilemma of conflicting rights and interests of both employer and
employee: “First, that property rights assume priority; secondly, that privacy rights are fundamental rights
that cannot be waived or varied; lastly, that a balance be struck between privacy and property rights.” Findlay
and McKinlay, “Surveillance, Electronic Communications Technologies and Regulation,” 307. 84 National Labour Relations Act (NLRA) was enacted in 1935 to protect the rights of employees, to encourage
collective bargaining, and to curtail certain private sector labour and management practices, which can harm
the general welfare of workers (https://www.nlrb.gov/resources/national-labor-relations-act [accessed
September 30, 2015]). It establishes regulations designed to eliminate personal, psychological, and
informational injuries and harms from occurring in the workplace. 85 The FTC Act 1914 outlaws unfair acts or practices that affect commerce. The FTC today regulates any acts
and practices that involve sensitive consumer and employee information during doing business. The FTC
prohibits deceptive practices (collecting, using, and sharing) employee and consumer data enforcing data
security and preventing identity theft (https://www.sba.gov/content/privacy-law [accessed September 30,
2015]). 86 The EPPA 1988, enforced by the Employment Standards Administration’s Wage and Hour Division (WHD)
within the U.S. Department of Labour (DOL), prohibits employers from using lie detector tests as part of pre-
employment screening or during employment (http://www.dol.gov/compliance/laws/comp-eppa.htm;
http://www.dol.gov/whd/regs/compliance/whdfs36.pdf [accessed September 30, 2015]). 87 According to ECPA and summarized by Doyle, “it is a federal crime to wiretap or to use a machine to capture
the communications of others without court approval, unless one of the parties has given his prior consent.”
Charles Doyle, “Privacy: An Overview of the Electronic Communications Privacy Act,” CRS Report for
Congress (Congressional Research Service), 2012, 7. 88 Doyle, “Privacy: An Overview of the Electronic Communications Privacy Act,” 7. Cf. Daniel J. Solove and
Paul M. Schwartz, Privacy Law Fundamentals (Portsmouth, NH: IAPP, 2017), 69. 89 Caron Beesley, “Email, Phone and Social Media Monitoring in the Workplace – Know Your Rights as an
Employer,” https://www.sba.gov/blogs/email-phone-and-social-media-monitoring-workplace-know-your-
rights-employer [accessed September 25, 2015]. 90 H. Marshall Jarrett and Michael W. Bailie, “Prosecuting Computer Crimes,” Computer Crime and
Intellectual Property Section Criminal Division, 2nd ed. (Washington: Legal Education Executive Office for
United States Attorneys, 2010), 12.
Towards Representational Practices of Surveillance
22
the “expected norms of intended use,”91 it becomes a truly blemished intrusion. However, in general,
the legal system in the US upholds the property rights of the employer as well as the rights of the
employee, for example by prohibiting certain unlawful invasions of privacy, determined to be such
by reference to the reasonableness or unreasonableness of the employer’s action.92
Current legal approaches in Britain protecting employee rights and restricting surveillance are
derived both domestically and from the European Union (EU), and thus British law, in the Human
Rights Act 1988 (HRA), establishes the core of employee protection.93 At the same time, the Data
Protection Act (DPA) 1998, enacted to bring British law in line with the 1995 EU Data Protection
Directives, describes UK law on data processing and identifiable living people. In the DPA 1998, the
UK Parliament defines the way and manner in which data about people may be used or handled, in
such a way as to protect people’s fundamental rights and freedom.94 However, this act, according to
Findlay and McKinlay, “further complicates the complex legal and bargaining issues surrounding
surveillance and privacy.”95 For, the traditional stance of British courts, gave priority to management
prerogatives and less recognition to employees’ interests.96 While the basic principles (right to
privacy) and values (freedom and autonomy) are honoured and properly held, the DPA has a
reputation for complexity, as it is not always simple to interpret them due to the existing uncertainty
about their aims, content and principles.97 The Telecommunications (Lawful Business Practice)
(Interception of Communications) Regulations 2000 (known as the ‘Lawful Business Practice’
Regulations) provide, in fact, a statutory framework enabling and permitting employers to conduct
and employ certain surveillance technologies and to monitor and record certain communications
without the consent of the caller, sender or recipient.98
The Universal Declaration of Human Rights, article 12, states that “[N]o one shall be subjected to
arbitrary interference with his privacy, family, home or correspondence, or to attacks upon his honour
and reputation. Everyone has the right to the protection of the law against such interference or
attacks”99 In the present European context, though there are some fundamental constitutional
91 Jarrett and Bailie, “Prosecuting Computer Crimes,” 9. 92 Findlay and McKinlay, “Surveillance, Electronic Communications Technologies and Regulation,” 305-308. 93 Findlay and McKinlay, “Surveillance, Electronic Communications Technologies and Regulation,” 305-318.
Through these HRA, the UK tried to incorporate European Convention on Human Rights into its legislation
and set out some fundamental rights, such as right to life, liberty and security, insisting on the freedom of
expression and freedom from inhumane or degrading treatment. 94 The DPA grants employees the right to know what information the employers possess about them and
provides a framework for ensuring that their personal and professional information is processed and handled
properly. See the link below for more details of the act:
http://www.legislation.gov.uk/ukpga/1998/29/pdfs/ukpga_19980029_en.pdf [accessed September 30, 2015]. 95 Findlay and McKinlay, “Surveillance, Electronic Communications Technologies and Regulation,” 308. 96 M. Ford, “Two Conceptions of Worker Privacy,” Industrial Law Journal 31, no. 2, (2002): 135–155. 97 David I. Bainbridge, Introduction to Computer Law, 5th ed. (Esse, England: Pearson Education Ltd., 2004),
430. 98 The so-called limited set of circumstances that promotes and legalizes employee monitoring are: to establish
the existence of facts, to identify unauthorized use of the communications system and to ensure the effective
operation of the same, to assess compliance with regulatory practices and procedures applicable to the
business, and to prevent and detect crime in the interest of individual, organizational and national security.
http://www.legislation.gov.uk/uksi/2000/2699/pdfs/uksi_20002699_en.pdf [accessed October 5, 2015]. 99 “The Universal Declaration of Human Rights,” Donegall Pass Community Forum, (2006).
http://donegallpass.org/UNIVERSAL_DECLARATION_OF_HUMAN_RIGHTS.pdf [accessed October 5,
2015]. The Universal Declaration of Human Rights (UDHR) is a declaration adopted by the United Nations
General Assembly on 10 December 1948 at Palais de Chaillot, Paris. The Declaration arose directly from the
experience of the Second World War and represents the first global expression rights to which all human
beings are inherently entitled. It consists of 30 articles which have been elaborated in subsequent international
treaties, regional human rights instruments, national constitutions and laws.
Towards Representational Practices of Surveillance
23
premises, such as those as stated in the French law100 that “workers retain all of their private rights
in the workplace,”101 the European Court of Human Rights (ECHR) continues to maintain a
paradoxical position with regard to surveillance and privacy.102 We find no specific EU legislation
regarding the organizational surveillance on employees and the consequent concerns of employee
privacy and protection of their personal data at work. However, the Charter of Fundamental Rights
of the European Union in Article 31 (1) states that “every worker has the right to working conditions
which respect his or her health, safety and dignity.” Article 7 & 8 of the same Charter proclaims that
“everyone has the right to respect for his or her private and family life, home and communications”
(article 7), and “everyone has the right to the protection of personal data concerning him or her”
(article 8). 103 In the same way, the General Data Protection Regulation (GDPR) of European Union,
which came into force on the 25th of May 2018, regulate workplace monitoring and enforces the
appropriate security for the sensitivity of employees’ data and the risk associated with processing.104
It strives to find a balance between the financial and security interests of the employers and the
privacy interests of employees. The GDPR, its regulations on employee monitoring and its reception
will be further explained in the third chapter. Although European legislation aims to balance workers’
rights such as privacy with the functioning of the company that employs them, it remains subject to
further debate and research insofar as the interest of any company is mainly its own profit and growth.
There are significant differences between employee monitoring laws in various jurisdictions of the
Asia-Pacific regions. Though several of them have adopted regulations on the US model, where a
prior notice is sufficient for the employer to monitor, some countries like Japan have adopted their
own guidelines supplementing the legislative frameworks.105 A range of State and federal legislation
permits and regulates employee surveillance and the handling of personal and professional data. The
federal Privacy Act 1988 in Australia, which was applied to the private sector in 2001, permits
employee monitoring with an ‘employee records exemption’ for data connected to current or former
employment relationship and records.106 Besides, the state level privacy laws in Australia (e.g., the
100 France has not yet enacted any specific legislation on employee monitoring. Yet general labour and other
civil laws are in force, along with French Data Protection Act. For instance, DP Act declares that employee
monitoring must take due consideration of transparency and proportionality. See Miriam Wugmeister,
“Comparing the U.S. and EU Approach to Employee Privacy,” 2008.
http://www.mofo.com/resources/publications/2008/02/comparing-the-us-and-eu-approach-to-employee-
pri__ [accessed September 25, 2015]. French law on Background Checks shows that the employers may take
from job applicants only personal data that have a necessary and direct connection with the actual employment
situation in question. The regulation of automated treatments of data, where there is a possibility of
identification of individuals (the Data Processing and liberty regulation), the protection of the right to respect
private life (1970 amendment to Article 9 of the civil code), and the protection of individual liberties in the
enterprise (1992 amendments to the Labour Code) frame the use of electronic surveillance technologies in
the workplace in France. See Lawrence E. Rothstein. “Privacy or Dignity? Electronic Monitoring in the
Workplace.” New York Law School Journal of International and Comparative Law, 2000.
https://cyber.law.harvard.edu/privacy/PrivacyOrDignity(Rothstein).htm [accessed September 30, 2015]. 101 Findlay and McKinlay, “Surveillance, Electronic Communications Technologies and Regulation,” 307. 102 Findlay and McKinlay, “Surveillance, Electronic Communications Technologies and Regulation,” 305-318. 103 Charter of Fundamental Rights of the European Union. http://www.europarl.europa.eu/charter
/pdf/text_en.pdf [accessed September 28, 2015]. This charter, consisting of 54 articles under seven titles,
deals with human dignity, freedom, equality, and human rights and justice. 104 European Parliament, “General Data Protection Regulation,” Official Journal of the European Union, May
25, 2018. http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679 [accessed May 28,
2018]. 105 Bevitt et al., “Monitoring Employees: Striking a Balance,” 53-59.
http://www.mofo.com/resources/publications/2008/02/comparing-the-us-and-eu-approach-to-employee-
pri__ [accessed September 25, 2015]. 106 Wugmeister, “Comparing the U.S. and EU Approach to Employee Privacy.” See the link given in footnote
111 for more details.
Towards Representational Practices of Surveillance
24
Health Records Act 2002) protect private sector employee records. The Workplace Surveillance Act
2005 (NSW) in New South Wales and The Surveillance Devices (Workplace Privacy) Act 2006
(VIC) in Victoria, which were adopted to provide guidelines for workplace monitoring and
surveillance, state that employers can monitor employees either overtly, with prior notice, or
covertly, with the approval of a court and proper consent of employees.107 However, any records and
data related to employees should only be collected, used, processed, stored and disclosed for the
purpose of the employment relationship.
The Constitution of the People’s Republic of China, article 12, states that “the people should have
freedom of privacy of correspondence.”108 This Constitutional provision guaranteeing the freedom
and privacy of correspondence becomes ambiguous, however, as it lacks a systematic judicial
interpretation of the ways of implementation in real-life situations, such as employee monitoring and
the whole act of surveillance in the workplace. However, the Legal protection of privacy law in China
demands surveillance within the legal permit. The employee manual, in conformity with the Labour
Contract Law, contains the limit and extent of the implementation of monitoring systems and
practices.109 For the General Provisions of Regulations of the People’s Republic of China, for
Security Protection of Computer Information Systems, states in article 7 that “[N]o organization or
individual may make use of computer information systems to engage in activities harmful to the
interests of the State or collectives, or the legitimate rights of the citizens, nor endanger the security
of computer information systems.”110 Therefore, though China’s Safe Production Law imposes the
implementation of affirmative monitoring procedures in the workplaces for safety reasons,111
citizen’s lawful rights, elaborated in article 7 of the Administration Rules, states that “the
communication freedom and communication privacy of the user [of computer information networks]
are subject to legal protection. No entity or individual may use the internet in a way that violates the
law to harm communication freedom and communication privacy.”112 Thus, in China, the
‘Regulations’ (the 1994 Regulations on Safety and Protection of Computer Information Systems)
107 Bevitt et al., “Monitoring Employees: Striking a Balance,” 53-59. 108 The Constitution of the Republic of China, adopted by the National Constituent Assembly in 1946,
promulgated by the National Government in 1947, revised and amended in 2000,
http://www.taiwandocuments.org/constitution01.htm [accessed January 25, 2016]. The freedom and privacy
of correspondence of all citizens of the People’s Republic of China are protected by law and “no organization
or individual may, on any ground, infringe upon the freedom and privacy of citizens’ correspondence except
in cases where, to meet the needs of state security or of investigation into criminal offences” Constitution of
the People’s Republic of China, http://en.people.cn/constitution/constitution.html [accessed January 25,
2016]. 109 You Yunting, “Infringement on Privacy? Comment on Enterprise’s Monitoring of Employee’s Chat,”
http://www.chinaiplawyer.com/infringement-privacy-comment-enterprises-monitoring-employees-chat/
[accessed January 25, 2016]. See, Miriam H. Wugmeister and Christine E. Lyon, Global Employee Privacy
and Data Security Law, New York: Morrison & Foerster LLP, 2009, 284. 110 The Legislative Affairs Office of the State Council, Laws and Regulations of the People’s Republic of
China, Beijing: China Legal Publishing House, 2001, 2. See Laws of the People’s Republic of China,
Regulations for Safety Protection of Computer Information Systems,”
http://www.asianlii.org/cn/legis/cen/laws/rfspocis719/ [accessed January 25, 2016]. Wugmeister and Lyon,
Global Employee Privacy and Data Security Law, 284. 111 Law of the People’s Republic of China on Work Safety (adopted at the 28th Meeting of the Standing
Committee of the Ninth National People’s Congress on June 29, 2002 and promulgated by Order No. 70 of
the President of the People’s Republic of China on June 29, 2002),
http://english.gov.cn/archive/laws_regulations/2014/08/23/content_281474983042179.htm [accessed
January 25, 2016]. See also, Carlo D’Andrea, “The PRC Safe Production Law,”
http://www.eurobiz.com.cn/prc-safe-production-law/ [accessed January 25, 2016]. 112 Ron Cai, Jojo Bai, and Kevin Moore, “Employee Online Privacy in China,”
http://www.dwt.com/advisories/Employee_Online_Privacy_in_China_05_06_2009/ [accessed January 25,
2016].
Towards Representational Practices of Surveillance
25
and the ‘Administration Rules’ (the 1997 Administration Rules on Safety and Protection of
International Connection by Computer Information Networks) along with other directives of
Information Technology (IT), guarantee data and privacy protection of employees in the
organizational workplace.113
The Privacy Commission for Personal Data in Hong Kong, adopted in 2004 as per the Personal Data
(Privacy) Ordinance 1997, sets out guidelines for employee monitoring and insists that the
employer’s legitimate business interests must always be balanced against employees’ personal data
and privacy rights, and it asks for a transparent formulation of monitoring policies and practices.114
Countries like Japan (Law on the Protection of Personal Information 2005), New Zealand (Privacy
Act 1993), Mainland China (Employment Services and Management Regulations 2008), Malaysia
(The Employment Act 1955, The Personal Data Protection Bill 2009 – passed but not yet gazetted
to commence), South Korea (Communications Secrecy Protection Act of 1993, Act on the Promotion
of Information, Communications Network Utilization and Information Protection of 2001 and
Articles 17 and 18, Constitution 1948) and Taiwan (right to privacy – article 12, Constitution 1946
and in amendment in 1995; district court case law from 2003) propose the same frameworks of
proportionality, prior notification and proper consent for permitting companies to conduct employee
monitoring.115
Until previous decade, there was no specific law concerning or permitting employee monitoring and
the regulation of employee personal data in India. However, Article 21 of the Indian Constitution,
entitled “Protection of Life and Personal Liberty,” states that “no person shall be deprived of his life
or personal liberty except according to procedure established by law.”116 It assures the right to live
with human dignity, free from exploitation and intrusion by others. Hence, the right to privacy is
implied in this right to life and liberty. Although the Constitution of India does not obviously grant
its citizens a fundamental right to privacy, the Courts have identified a right to privacy in other
existing fundamental rights, as we see in Article 21. However, in the 2017 landmark case of Justice
K S Puttaswamy (Retd.) & Anr. vs. Union of India and Ors., the constitution bench of the Honourable
Supreme Court has upheld the Right to Privacy as a fundamental right (under Articles 14-19 and 21
of the Constitution of India),117 subject to certain reasonable restrictions.118 The Information and
Technology Act 2000,119 which is amended in 2008 and named the Information and Technology
113 Wugmeister and Lyon, Global Employee Privacy and Data Security Law, 284. 114 Wugmeister, “Comparing the U.S. and EU Approach to Employee Privacy.” Cf. Bevitt et al., “Monitoring
Employees: Striking a Balance,” 53-59. 115 Wugmeister, “Comparing the U.S. and EU Approach to Employee Privacy.” Cf. Bevitt et al., “Monitoring
Employees: Striking a Balance,” 53-59. 116 Vidhan Maheshwari, “Article 21 of the Constitution of India – The Expanding Horizons,”
http://www.legalserviceindia.com/articles/art222.htm [accessed October 6, 2015]. 117 These rights range from rights relating to equality (Articles 14 to 18); freedom of speech and expression
(Article 19(1)(a)); freedom of movement (Article 19(1)(d)); protection of life and personal liberty (Article
21) and others. 118 Supreme Court of India, Case: Justice K. S. Puttaswamy (Retd.) & Anr. vs. Union of India and Ors.,
https://supremecourtofindia.nic.in/pdf/jud/ALL%20WP(C)%20No.494%20of%202012%20Right%20to%2
0Privacy.pdf [accessed October 10, 2018]; Vrinda Bhandari, Amba Kak, Smriti Parsheera and Faiza Rahman,
“An Analysis of Puttaswamy: The Supreme Court’s Privacy Verdict,” IndraStra Global, November 08, 2017,
https://www.indrastra.com/2017/11/An-Analysis-of-Puttaswamy-Supreme-Court-s-Privacy-Verdict-003-
11-2017-0004.html [accessed October 10, 2018]. Reasoable restrictions within the context of Article 21
consists of an reasonable invasion of privacy by a federal governament on the basis of a law which stipulates
fair, just and reasonable procedure. It demands also a three-fold requirement of (i) legality (existence of law);
(ii) need, (a legitimate state aim); and (iii) proportionality (rational nexus between the objects and the means
adopted to achieve them). 119 The Information Technology Act, 2000 (ITA-2000), as an act of Indian Parliament first notified in 2000
and amended in 2008 as primary law dealing with cybercrime and electronic commerce, provides legal
Towards Representational Practices of Surveillance
26
(Amendment) Act 2008, reaffirms the fundamental right to life and liberty (including right to
privacy) as guaranteed by the Indian Constitution. This requires the prior consent of employees
before collecting and processing personal data.
The IT Act of 2000, with its amendments in 2008, deals with issues relating to the payment of
compensation (Civil) and punishment (Criminal) in case of wrongful disclosure and misuse of
personal data and violation of contractual terms with respect to personal data.120 It enables a corporate
body to possess and handle sensitive personal data so long as it implements reasonable security
practices. Similarly, the Information Technology Rules of 2011 (Reasonable Security Practices and
Procedures and Sensitive Personal Data or Information) seeks to protect the sensitive personal data
or information of all persons.121 It identifies reasonable security practices and procedures for a person
or a corporate body to collect, receive, possess, store or handle information. Apart from these IT
Rules of 2011, a Personal Data Protection Bill122 was introduced in 2018 and at the time of this
writing is under consideration by parliament, yet to be enacted into law. This proposed Privacy Bill
may create a Data Protection Authority in India to monitor and enforce the proposed laws. A detailed
analysis of this Bill and the Data protection will be provided in the third chapter. As a final comment,
we may note that all legal bases of employee surveillance are based, on the one hand, on the premise
that they are necessary for the proper development of the employment relationship, in order to secure
business operations and comply with legal obligations, and founded, on the other hand, on the
principles of necessity (with prior consent and proper notification), proportionality and transparency.
However, the sanitizing role of surveillance123 in shaping organizational and social behaviours124 and
reshaping employee perspectives may be questioned in light of their unintended individual and social
consequences, which will be meticulously analysed in the later part of this research.
1.2 ELECTRONIC SURVEILLANCE FRAMEWORKS
This section presents five theories in recent literature in monitoring and surveillance. These are
clustered together as ‘electronic surveillance frameworks’ to clarify and analyse the legitimate and
expected use of surveillance in the organizational workplace. Although people, both advocates and
frameworks for electronic governance and monitoring computer/network records and data. It defines
cybercrimes and clusters them into three basic groups: those against the individual (email harassment, cyber
stalking, dissemination of obscene material, hacking, indecent exposure, network trespassing, etc.), against
organizations (hacking/tracking, possession and transmission of unauthorised information, cyber-terrorism,
etc.), and against society at large (scandalizing the youth by indecent exposure, trafficking, pornography,
etc.). “The Information Technology (Amendment) Act, 2008,” Ministry of Law and Justice, The Gazette of
India, 2009.
http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/ it_amendment_act2008.pdf [accessed
September 30, 2015]. 120 Information Technology Act, 2000, http://www.wipo.int/wipolex/en/text.jsp?file_id=185999 [accessed
October 12, 2018]. 121 Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or
Information) Rules, 2011, http://www.wipo.int/edocs/lexdocs/laws/en/in/in098en.pdf [accessed October 12,
2018]. 122 Ministry of Electronics & Information Technology, “The Personal Data Protection Bill 2018,” Government
of India, http://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill%2C2018_0.pdf [accessed
October 16, 2018]. Here after this source will be cited as The Personal Data Protection Bill, 2018 with Article
number. 123 K.D. Haggerty and R.V. Ericson, “The Surveillant Assemblage,” British Journal of Sociology 51, no. 3
(2000): 605-622. 124 David Zweig, “Beyond Privacy and Fairness Concerns: Examining Psychological Boundary Violations as
a Consequence of Electronic Performance Monitoring,” in Electronic Monitoring in the Workplace:
Controversies and Solutions, ed. John Weckert, 101-122 (Hershey: Idea Group Publishing, 2005): 102.
Towards Representational Practices of Surveillance
27
critics recognize the need for some form of monitoring in particular contexts,125 the possible extent
of the applications and devices used and the boundary between persistent and benevolent or insidious
and fair technologies remain a complex factor in the discussion of workplace surveillance. In the
following, we will first illustrate the five theoretical frameworks, then, elaborate them with an
analysis of the effects of electronic surveillance in the workplace.
1.2.1 The Metaphor of the Panopticon: Structured, Controlled Mechanism
The metaphor of the panopticon,126 first proposed in the early nineteenth century by Jeremy Bentham,
can help us understand the presence and effects of surveillance in the workplace. For, some of the
frameworks that have emerged in tandem with electronic monitoring are, potentially and actually,
linked to this paradigm. The aim of a panopticon, as a distinct architectural form, is to allow for
constant surveillance of all the inmates in a prison.127 Since, in this situation, people cannot determine
when they are being watched, they are forced to act as if they are constantly viewed and scrutinized.
Michel Foucault, referring to the panopticon metaphor, tries to show how our contemporary society
is structured as this kind of surveillance system, stating that we now live in the panoptic machine:
“We are neither in the amphitheatre, nor on the stage, but in the panoptic machine, invested by its
effects of power, which we bring to ourselves since we are part of its mechanism.”128 Without a
proper orientation toward Foucault’s understanding of discipline and the panopticon, the theorization
of workplace surveillance practices today becomes very hazardous. Certain parallels in the structures
of the panopticon and the monitored workplace are immediately apparent, such as “the employment
of Panoptic-like surveillance as an attempt to subjugate employees to the power of management [...
which] often instils a sense of powerlessness and fear among the observed.”129 Moreover, from the
observer’s perspective, the desired outcome permits easier control of the observed and, hence,
employees themselves feel that they are isolated in their own communication environment.130
The panoptic structure exposes the helplessness of individuals in the face of the overwhelming force
of institutions such as workplaces to establish the terms of life within their boundaries.131 Carl Botan
and Mihaela Vorvoreanu give an operational understanding of the panoptic effect, arguing that each
situation involves “(1) employee perception of being surveilled; (2) surveillance potential of the
125 Zweig, “Beyond Privacy and Fairness Concerns,” 102. 126 A panopticon is a prison built so radially that a guard at a central position can see all the prisoners. An
architectural design of a panopticon was conceived by the English philosopher and social theorist Jeremy
Bentham in the late 18th century. This design allowed for the observation of a large number of prisoners from
a central location without their knowledge of when and how often they were being observed. Foucault uses
this metaphor of the panopticon in his theory of surveillance (Michel Foucault, Discipline and Punish: The
Birth of the Prison (New York: Vintage Books, 1997). Here the subjects under surveillance become the source
of information rather than a participant in any communication. In the modern scenario of the organizational
workplace, communication technologies allow for an even greater monitoring of its employees without any
overt signs of surveillance. See Scott C. D’Urso, “Who’s Watching Us at Work? Toward a Structural-
Perceptual Model of Electronic Monitoring and Surveillance in Organizations,” Communication Theory 16
(2006): 288. 127 Bentham emphasizes the totality of observation that, for him, unobserved space always encourages
unregulated behaviour. Hence, he writes that “cells, communications, outlets, approaches, there ought not
anywhere to be a single foot square, on which man or boy shall be able to plant himself – no not for a moment
– under any assurance of not being observed. Leave but a single spot thus unguarded, that spot will be sure
to be a lurking-place for the most reprobate of the prisoners, and the scene of all sorts of forbidden practices.”
Jeremy Bentham, The Works of Jeremy Bentham (New York: Russell & Russell, 1962), 86. 128 Michel Foucault, Discipline and Punish: The Birth of the Prison (New York: Vintage Books, 1997), 217. 129 D’Urso, “Who’s Watching Us at Work?” 288. 130 D’Urso, “Who’s Watching Us at Work?”288. 131 Bart Simon, “The Return of Panopticism: Supervision, Subjection and the New Surveillance,” Surveillance
& Society 3, no. 1 (2005): 3.
Towards Representational Practices of Surveillance
28
technology; (3) management policy; and (4) maturation.”132 This panoptic effect is generated through
a suspicion of being always surveilled even in its absence. It also looks for the extent of employee
visibility and employer invisibility through the implementation of technology and the quantity and
permanence of records and their analysis through its performance.133 The effectiveness of
surveillance practices is determined by measuring the time and cost of data analysis, which is the
function of management policy. The maturation, finally, calls for the integration of this management
policy and surveillance technologies. In this particular context of panoptic relationship, which is
based on the disparity between the visible and the invisible,134 employees are vulnerable because
they are visible and “that vulnerability is magnified by the invisibility of the observer.”135 In this
regard, as Foucault rightly observes, “surveillance is permanent in its effects even if it is
discontinuous in its action”136 in the workplace.
Information technology, which is broadly used in any work context today, intrinsically turns out to
be surveillance technology when it is used “as a tool not just for work but for establishing and
enforcing a particular kind of power relationship and for producing desired effects.”137 As a result,
in the workplace, the desirable freedom of the employees is restricted, and strain may be placed on
the relationship between the employer and the employee. Botan and Vorvoreanu explain that
alongside the creation of false impressions, such as that the management is really interested in
quantity not in quality, the feeling and actual perception of being distrusted and being treated as
children become aloft in this particular context.138 Furthermore, increased uncertainty and reduced
workplace communication is also adequately observed in this panoptic surveillance.139 The various
and multi-faceted effects of surveillance, which is panoptic in particular, always include both the
desired or sought after and the unexpected or unwanted, and a detailed description of the same will
be exposed in the final section of this chapter.
1.2 2 Agency Theory: Process of Hierarchical Regimentation
Agency theory is a supposition or a theory developed in the 1960s and early 1970s that explains the
relationship between principals and agents.140 Agency theory focuses on engagements between the
principal (one or more persons) and the agent (another person), who are “assumed to be rational
economic-maximizing individuals,” to perform some work.141 It focuses on the way in which the
132 Carl Botan and Mihaela Vorvoreanu, “What Do Employees Think about Electronic Surveillance at Work?”
in Electronic Monitoring in the Workplace: Controversies and Solutions, ed. John Weckert, 123-144
(Hershey: Idea Group Publishing, 2005): 132-134. 133 Otis and Zhao, “Producing Invisibility,” 151. 134 Carl Botan, “Communication Work and Electronic Surveillance: A Model for Predicting Panoptic Effects,”
Communication Monographs 63 (1996): 298. 135 Botan and Vorvoreanu, “What Do Employees Think about Electronic Surveillance at Work?” 131. 136 Michel Foucault, Discipline and Punish: The Birth of the Prison, trans. Alan Sheridan (New York: Penguin
Books, 1991), 201. This work was first published in 1975 as Surveiller et punir: Naissance de la prison by
Éditions Gallimard. This translation was first published by Allen Lane in 1977. 137 Botan, “Communication Work and Electronic Surveillance,” 299. 138 Botan and Vorvoreanu, “What Do Employees Think about Electronic Surveillance at Work?” 135-136. 139 Botan, “Communication Work and Electronic Surveillance,” 299. 140 The principal is the one who has the legal capacity to perform an act or empower an agent, who is capable
of comprehending the act to be undertaken, to carry out that act. Principals can be persons, corporations,
partnerships, non-profit organizations, and government agencies. The principal-agent relationship
understands that “the agent will perform for and on behalf of the principal, in which agents assume an
obligation of loyalty to the principal and principal, in turn, reposes trust and confidence in the agent.” See
“Principal-Agent Relationship,” http://www.ruf.rice.edu/~schuler/principal-agent.html [accessed January 10,
2015]. 141 Hans Landstrom, “Agency Theory and Its Application to Small Firms: Evidence from the Swedish Venture
Capital Market,” The Journal of Entrepreneurial Finance 2, no. 3 (1993): 205.
Towards Representational Practices of Surveillance
29
work is delegated from a superior – a principal, here the supervisor – to an inferior who does the
work – an agent, here the subordinate.142 A hierarchy of control is automatically generated to manage
business operations through a systemic approach. The problem in any action, according to this theory,
arises when there is a division of labour and orientation towards different goals within the
organization.143 For, the relationship between two parties is mostly described using the contract
metaphor144 and theory according to which the written or unwritten contracts in a particular
organization specify the rights of both the principal and the agent as well as evaluation criteria.
According to Kathleen M. Eisenhardt, this theory is concerned with resolving two problems that can
occur in agency relationships: “The first is the agency problem that arises when (a) the desires or
goals of the principal and agent conflict and (b) it is difficult or expensive for the principal to verify
what the agent is actually doing” and “the second is the problem of risk sharing that arises when the
principal and agent have different attitudes toward risk.”145 While the major difficulty in the former
category seems to be the inability of the principal to verify the agent’s appropriate behaviour, the
latter covers both the principal and the agent, given that they may prefer different actions as different
risk preferences arise.146
The key idea of this theory is that the principal-agent relationships entail both human/individual
assumptions, such as self-interest and risk aversion, and also organizational assumptions, such as
partial goal conflict among participants, efficiency as the effectiveness criterion, and so on.147
Therefore, on the one side, when the contract between the principal and the agent is outcome-based,
the latter is more likely to behave in the interests of the former; and conversely, on the other side, the
agent does the same when the principal has information to verify the agent behaviour.148 However,
one of the common elements in the principal-agent model, according to Gottschalk, is that “principals
are unable to monitor agents’ actions or information; the heart of these models involves setting a
wage for an agent without fully knowing the agent’s effort (moral hazard) or ability (adverse
selection).”149 This means that the principal places the agents’ behaviour under surveillance when he
is unable to possess complete information about him/her. Our major concern with respect to the
agency theory, in line with current surveillance practices in the workplace, is the principal’s
(employer’s or management’s) ability to monitor the agent’s (employee’s) behaviour due to the
increased use of present technological advancement. For present monitoring, in addition to observing
and measuring the behaviour of the agent, also tries and formulates the efforts to control them.
However, the assumption of agency theory that self-interest motivates all parties, both principals and
agents, is challenged when each and every move of an employee is monitored in the workplace. For
often, electronic surveillance in the workplace disrupts individual motivation and interest, which in
turn leads to conflicts between employer and employee.
142 Devasheesh P. Bhave, “The Invisible Eye? Electronic Performance Monitoring and Employee Job
Performance,” Personal Psychology 67 (2014): 608. 143 Landstrom, “Agency Theory and Its Application to Small Firms,” 205. 144 Petter Gottschalk, Knowledge Management Systems in Law Enforcement: Technologies and Techniques
(Hershey: Idea Group Publishing, 2007), 13. Cf. Landstrom, “Agency Theory and Its Application to Small
Firms,” 205. 145 Kathleen M. Eisenhardt, “Agency Theory: An Assessment and Review,” The Academy of Management
Review 14, no. 1 (1989): 58. 146 Landstrom, “Agency Theory and Its Application to Small Firms,” 205. Cf. Eisenhardt, “Agency Theory:
An Assessment and Review,” 58. 147 Eisenhardt, “Agency Theory: An Assessment and Review,” 59. 148 Eisenhardt, “Agency Theory: An Assessment and Review,” 60. 149 Gottschalk, Knowledge Management Systems in Law Enforcement, 13.
Towards Representational Practices of Surveillance
30
1.2.3 Procedural Justice (Fairness) Theory: Principles of Just Bustle
Among the three dimensions of justice, namely distributive, procedural, and interactional,150
procedural justice concerns people’s subjective evaluations of the justice of procedures – whether
they are in conformity with the norms of society in a fair process of social interaction and decision-
making.151 It refers to the “perceived fairness of the policies, procedures, and criteria used by decision
makers in arriving at the outcome of a dispute or negotiation.”152 Usually, distributive justice, which
refers to “the perceived fairness of the tangible outcome of a dispute, negotiation, or decision
involving two or more parties,”153 is discussed in relation to the organizations in which organizational
resources are distributed among personnel and considers their reactions to it. The major focus of
these discussions is the outcomes of distributive decisions, which cannot on its own provide a
complete picture of justice. For this reason, concerns about the processes through which decisions
are made form the basis of what is referred to as procedural justice.154 This is further defined as “the
perceived fairness of the procedures used in making decisions,”155 which refers to the ‘means’
whereby various ‘ends’ are attained, and in particular to an individual’s perception that an activity,
in which he/she is a participant, is fairly conducted.156 Fair procedures are said to be more “consistent,
unbiased and impartial, representative of all parties’ interests, and are based on accurate information
and on ethical standards.”157 This procedural fairness, which we call “just bustle,”158 marks the
novelty of the treatment deployed in any specific problematic context with legitimate expectations,
and does so in circumstances where a contrary statutory intention is clearly manifested.
150 E.C. Clemmer and B. Schneider, “Fair Service,” in Advances in Services Marketing and Management, vol.
5, ed. S.W. Brown. D.A. Bowen, and T. Swartz (Greenwich, CT: JAI Press, 1996), 109-126. 151 Tom R. Tyler and Avital Mentovich, “Mechanisms of Legal Effect: Theories of Procedural Justice,” Public
Health Law Research, Robert Wood Johnson Foundation, 2011, 12. Stanton explains this tripartite split of
fairness perceptions by reference to Niehoff and Moorman (1993), writing that: “Procedural fairness was
defined as the extent to which workers felt that the procedures followed by organizational decision-makers
were appropriate for assuring fair outcomes. Interactional fairness was defined as the extent to which workers
believed they had been treated with honesty, sincerity, and respect by organization decision-makers. Finally,
distributive fairness was defined as the extent to which workers felt appropriately rewarded for their efforts
in the workplace.” Stanton, “Traditional and Electronic Monitoring from an Organizational Justice
Perspective,” 131. See also Brian P. Niehoff and Robert H. Moorman, “Justice as a Mediator of the
Relationship between Methods of Monitoring and Organizational Citizenship Behaviour,” Academy of
Management Journal 36, no. 3 (1993): 527-556. 152 Jeffrey G. Blodgett, Donna J. Hill and Stephen S. Tax, “The Effects of Distributive, Procedural, and
Interactional Justice on Postcomplaint Behaviour,” Journal of Retailing 73, no. 2 (1996): 189. 153 Blodgett, Hill and Tax, “The Effects of Distributive, Procedural, and Interactional Justice on Postcomplaint
Behaviour,” 188. 154 Robert Folger and Jerald Greenberg, “Procedural Justice: An Interpretive Analysis of Personnel Systems,”
Research in Personnel and Human Resources Management 3 (1985): 141-142. See also, Stanton, “Traditional
and Electronic Monitoring from an Organizational Justice Perspective,” 131; C.L. Martin and D.H. Nagao,
“Some Effects of Computerized Interviewing on Job Applicant Responses,” Journal of Applied Psychology
74 (1989): 72-80. 155 Folger and Greenberg, “Procedural Justice,” 143. 156 Mary J. Culnan and Pamela K. Armsstrong, “Information Privacy Concerns, Procedural Fairness, and
Impersonal Trust: An Empirical Investigation,” Organization Science 10, no. 1 (1999): 107. 157 Blodgett, Hill and Tax, “The Effects of Distributive, Procedural, and Interactional Justice on Postcomplaint
Behaviour,” 189. 158 Procedural justice, in our view, also concerns people’s objective evaluations of the justice of procedures,
along with its subjectivity as much as it is about the compliance of fairness under just principles. So, it is a
“just bustle” between the fairness of decision-making and the fairness of interpersonal treatment.
Towards Representational Practices of Surveillance
31
Regarding surveillance in the workplace and the perception of procedural fairness, Gerald Leventhal
proposes a two-stage process.159 In the first stage, employees, based on the objective characteristics
of the system, develop a mental map of structural elements, such as who designs and makes decisions
concerning surveillance systems in particular situations, determines criteria of evaluation, takes steps
taken for the consequence analysis, and so on. In the second stage, employees evaluate the same
elements, applying procedural fairness rules about the consistency, flexibility, bias and the
compatibility of the system with the framework of their own moral and ethical values.160 In the same
way, as Folger and Greenberg (1985) elucidate, we can distinguish two conceptual perspectives on
procedural justice. The first “examines various dispute resolution procedures with respect to the types
of control they afford the disputants,” and the second, which is more structural in nature, “proposes
a list of procedural elements that contribute to fairness and a system of rules used in evaluating
procedural fairness.”161 Procedural justice in organizations can refer to objective (actual or factual)
justice and/or to subjective circumstances (perceptions of objective procedures or of the capacity of
an objective procedure to enhance fairness judgements) and the objective or subjective fairness of a
given decision.162
There is also an instrumental model effect for procedural justice, which claims that individuals
attribute no value to fair procedures independent of their association with fair outcomes.163 In this
case, electronic performance monitoring and control systems will be viewed as procedurally just
insofar as they adhere to certain predictors or principles and procedural rules and lead to fair
outcomes.164 Stanton, referring to Leventhal (1980), labels these predictors as follows: consistency
(over time and in different cases) in monitoring, accuracy (sufficient knowledge of job performance
as prerequisite) of knowledge of performance, monitoring control (the extent and degree of evidence
collection and presentation) and justifications (proportionality in allocation process and outcomes)
for monitoring.165 As today electronic surveillance is raising new concerns about privacy and
fairness, the model of procedural justice theory should be integrated into our analysis in order to
prioritize the values at stake in the process of monitoring employees.
1.2.4 Information Boundary Theory: Enhancing Central Contour
Information Boundary Theory (IBT) was developed in the context of a programme of research that
investigated the impacts of monitoring and surveillance technologies on worker privacy.166 Since
159 Gerald S. Leventhal, “What Should be Done with Equity Theory? New Approaches to the Study of Fairness
in Social Relationships,” in Social exchange: Advances in theory and research, ed. K. Gergen, M. Greenberg,
and R. Willis, (New York: Plenum Press, 1980), 27-55. 160 Providing consumers with voice and control over actual outcomes are the two contributing aspects of
procedural fairness. Mary J. Culnan and Pamela K. Armsstrong, “Information Privacy Concerns, Procedural
Fairness, and Impersonal Trust: An Empirical Investigation,” Organization Science 10, no. 1 (1999): 107.
Referring to the Personal Security Procedural Fairness Guidelines approved on 2010 (by Australian
Governament), the rules of procedural fairness require: a hearing appropriate to the circumstances; lack of
bias; evidence to support a decision; and inquiry into matters in dispute. See
https://www.protectivesecurity.gov.au/personnelsecurity/Documents/Procedural%20fairness%20guidelines.
pdf [accessed October 5, 2015]. 161 Folger and Greenberg, “Procedural Justice,” 144. 162 Mary A. Konovsky, “Understanding Procedural Justice and Its Impact on Business Organizations,” Journal
of Management 26, no. 3 (2000): 489-511. 163 Konovsky, “Understanding Procedural Justice and Its Impact on Business Organizations,” 493. 164 Bradley J. Alge, “Effects of Computer Surveillance on Perceptions of Privacy and Procedural Justice,”
Journal of Applied Psychology 86, no. 4 (2001): 797. 165 Stanton, “Traditional and Electronic Monitoring from an Organizational Justice Perspective,” 132-134. 166 Jeffrey M. Stanton and Kathryn R. Stam, “Information Technology, Privacy, and Power within
Organizations: A View from Boundary Theory and Social Exchange Perspectives,” Surveillance and Society
Towards Representational Practices of Surveillance
32
information technology plays a more significant role today in the surveillance of worker behaviour
in organizations, it is more important than ever to understand information boundary theory, as it deals
with the collection and control of the information resources of workers. Information Boundary
Theory holds that “motivation to reveal or withhold valued information via a given medium follows
rules for ‘boundary opening’ and ‘boundary closure,’ [which] are dynamic, psychological processes
of regulation by which people attempt to control flows of valued information to other people.”167 In
this respect, the unique domain of IBT is to envisage individual preferences and motivations
regarding the amount and type of valuable information the individual would be willing to reveal,
then to foresee the nature of the relation between this information and the message audience, its
expected use, and the benefits of revealing information.168 In other words, IBT, with its internal
disciplinary bodies, provides room for enhancing a central contour in the discussion accorded with
multiple nuances and legitimate interests of different parties involved. This boundary represents a
symbolic line denoting the extent to which potential and actual vulnerable information is closed off
from or disclosed to the other.169 These lines become thick when the disclosure is less likely, and thin
when more so.170
Moreover, Stanton and Stam have developed motivational variants of IBT using a regulatory focus
perspective of promotion and prevention. For example, on the one hand, in a boundary opening
perspective, information is revealed in a way that focuses on promotion in order to achieve or solidify
gains, and on prevention in order to prevent or mitigate losses. On the other hand, in a boundary
closure perspective, information is withheld for the same purposes.171 In a nutshell, information
boundary theory holds that the “individual can articulate a personal ‘calculus’ of boundary
negotiation, i.e., the conditions under which permitting information flow is acceptable or
unacceptable and this negotiation boundaries depends in part upon the status of the relationship
between the sender and the audience (individual or institutional) receiving it.”172 This model of
information boundary theory will contribute to the determination of a boundary in dealing with
individual and organizational information, and establish the extent to which information may be
monitored, collected, stored, and further used.
It remains unclear, however, to what extent these boundaries can clarify, negotiate, and foster
relationships and meet expectations in the workplace. Identifying the boundary itself is the first
ethical challenge. Besides, so long as status differences in the workplace limit collaboration among
workers, and the complexity of the contrast between the personalized and relational as well as the
situational and the value-based approach to the problem persists, it becomes even more critical to
employ and apply IBT. Moreover, a necessary variable must exist to facilitate the boundary opening
and boundary closure of information and the self. Hence, this discussion is moved to another
framework of a workplace surveillance called the Structural-Perceptual Model (SPM).
1, no. 2 (2003): 154. See also, Jeffrey M. Stanton, “Information Technology and Privacy: A Boundary
Management Perspective,” in Socio-Technical and Human Cognition Elements of Information Systems, ed.
Steve Clarke, Elayne Coakes, M. Gordon Hunter and Andrew Wenn (Hershey: Idea Group Publishing, 2003),
79-103. 167 Stanton and Stam, “Information Technology, Privacy, and Power within Organizations,” 154. 168 Stanton and Stam, “Information Technology, Privacy, and Power within Organizations,” 155. 169 Sandra Petronio, Boundaries of Privacy: Dialectics of Disclosure (Albany, NY: State University of New
York Press 2002), 6-9. 170 Sandra Petronio and Wesley T. Durham, “Communication Privacy Management Theory,” in Engaging
Theories in Interpersonal Communication: Multiple Perspectives, ed. L.A. Baxter and D.O. Braithwaite
(Thousand Oaks, CA: Sage, 2008), 338. 171 Stanton and Stam, “Information Technology, Privacy, and Power within Organizations,” 156. 172 Stanton and Stam, “Information Technology, Privacy, and Power within Organizations,” 155.
Towards Representational Practices of Surveillance
33
1.2.5 Structural-Perceptual Model: An Integrated Regime?
The structural-perceptual model (SPM) of electronic surveillance, developed by Scott C. D’Urso in
relation to the panopticon metaphor, which we have already dealt with above, includes three primary
components: communication technologies, organizational factors, and organizational electronic
surveillance policies.173 These in turn yield panoptic effects in the organizational environment. Apart
from the individual perception of these effects, the structural-perceptual model aims to offer an
integrated overall consideration of all the components, and combines structural and perceptual
elements to make possible a full understanding of the impact of electronic surveillance in the
workplace.174 Through analysing these three components, the structural-perceptual model proposes
that the “relationship between key outcomes and the overall panoptic effect potential (from
communication technology, organizational factors, and policy) is moderated by employee concern
for surveillance.”175 In this regard, “the key components comprising the overall panoptic effect
potential contain inherent structural elements as well as the individual elements that employees
perceive.”176
Reflecting further on the structural-perceptual model, we find that the perceived concern for
surveillance may moderate individuals’ perception of electronic surveillance practices and policies
within an organization, as well as the organization’s willingness to give due respect to the employee.
However, SPM also lacks a critical criterion for determining what is expected and accepted for
different members of the organization and how the norms and policies are to be implemented
impartially. Again, it is also of prime concern to determine how to deal with social structures and
social actors/agents in the workplace (here every member of an organization) without compromising
its individual or subjective and structural or functional dimensions. The various models and theories
discussed above in the framework of electronic surveillance have shown their strengths and
weaknesses in the context of the organizational workplace, both individually and collectively.
Nevertheless, before beginning the task of framing a new structure and model, it is all the more
essential to consider currently predominant employee monitoring technologies and practices in the
workplace.
1.3 THE GADGETS OF “NEW” WORKPLACE SURVEILLANCE
The three groups described in this section include all the various technological ways and means
currently implemented in the organisational workplace. The number of organizations engaged in one
or another form of electronic employee monitoring has been steadily increasing over the past three
decades.177 The multitude of devices and approaches available today makes surveillance very easy
173 D’Urso, “Who’s Watching Us at Work,” 281-303. 174 D’Urso, “Who’s Watching Us at Work,” 292. 175 The following propositions are made on the basis of these three components: (1) that the overall panoptic
effect potential of communication technology is created through a combination of achievability and perceived
surveillance potentials; (2) that the combination of organizational need and perceived surveillance forms the
overall panoptic effect potential from organizational factors, and (3) that the combination of policy
restrictiveness and the perceived surveillance potential of an electronic surveillance policy gives rise to the
overall panoptic effect potential of organizational electronic surveillance policies. See, D’Urso, “Who’s
Watching Us at Work,” 293-298. 176 D’Urso, “Who’s Watching Us at Work,” 299. 177 Ifeoma Ajunwa, Kate Crawford, and Jason Schultz, “Limitless Worker Surveillance,” California Law
Review 105, no. 3 (2017): 735-776; Sherri Coultrup and Patrick D. Fountain, “Effects of Electronic
Monitoring and Surveillance on the Psychological Contract of Employees: An Exploratory Study,”
Proceeding of ASBBS 19, no. 1 (2012): 220; Christiane Spitzmüller and Jeffrey M. Stanton, “Examining
Employee Compliance with Organizational Surveillance and Monitoring,” Journal of Occupational and
Organizational Psychology 79 (2006): 245. See also J.M. Stanton and E.M. Weiss, “Electronic Monitoring
Towards Representational Practices of Surveillance
34
to conduct inside the workplace and makes it possible even to extend this monitoring outside the
workplace, going beyond the scope of the employment relationship. Among the common practices
of workplace surveillance, such as drug testing and biometric and electronic monitoring, today also
electronic surveillance practices are used to gather information by surreptitious, secret and stealthy
means and are of high concern because of their inexpensive and user-friendly nature.
Electronic surveillance, as analysed by Kizza and Ssanyu, generally includes: audio surveillance
(phone-tapping, voice over internet protocol, listening devices, etc.); visual surveillance (hidden
video surveillance devices, body-worn video devices, CCTV, etc.); tracking surveillance (global
positioning systems/transponders, mobile phones, radio frequency identification devices, biometric
information technology, etc.); and data surveillance (computer/internet, keystroke monitoring,
etc.).178 In other words, the present IoT-related monitoring devices include “ubiquitous network
records, browser history retention, phone apps, electronic sensors, wearable fitness trackers, thermal
sensors, and facial recognition systems.”179 Likewise, The recent development of sociometric
solutions are being used in the organizational offices to capture employees’ physical movements and
interactions everytime across desk spaces.180 These monitoring practices generally fall either overt
(the presence and applications of surveillance methods are made known and the devices are visible)
or covert (nothing is revealed to the worker).181 Both have challenging repercussions in the life of
employees. In the following, we will analyse some of the new data-gathering capabilities of
information technology and its practices in order to examine their expected benefits and possible
detriments with respect to employee life and organizational behaviour.
1.3.1 Proximity of Access Panels and Audio-Visual Surveillance
Access panels are electronic devices programmed to control entry into doorways, stairwells,
elevators, parking garages, or other restricted areas in the workplace to increase and stabilize
workplace security. They enable employees to access company facilities and enter into particular
areas and restrict access in case of specific threats, thereby securing sensitive areas and information
against unauthorized access.182 Either by electronic keypads or by swiping identification badges,
employees gain access to restricted areas. Access panels and access control points monitor what time
employees report to work and leave and enable employers to regularly review access logs, which
reveal employee’s misuse of time on the company premises. Sometimes, access panels are used to a
great degree to monitor and track employee behaviour by placing them on restrooms or break-room
doors, for instance to monitor how often and for how long employees use these areas.183 For these
reasons, the use of access panels in certain locations and zones is often hotly debated.
in Their Own Words: An Exploratory Study of Employees’ Experience with New Types of Surveillance,”
Computers in Human Behaviour 16 (2000): 423-440. 178 Kizza and Ssanyu, “Workplace Surveillance,” 1-18; West and Bowman, “Electronic Surveillance at Work,”
628-651. 179 Kaupins and Coco, “Perceptions of Internet-of-Things Surveillance by Human Resource Managers,” 54;
Torin Monahan, “Built to lie: Investigating Technologies of Deception, Surveillance, and Control,” The
Information Society 32, no. 4 (2016): 229-240. 180 Moore and Piwek, “Regulating Wellbeing in the Brave New Quantified Workplace,” 311. 181 Dave Nevogt, “Employee Monitoring Software and Tools - The Top 10 Options,” 2015.
http://blog.hubstaff.com/10-employee-monitoring-software-options-monitor-activity/ [accessed September
28, 2015]. 182 Corey A. Ciocchetti, “The Eavesdropping Employer: A Twenty-First Century Framework for Employee
Monitoring,” American Business Law Journal 48, no. 2 (2011): 302. 183 Ciocchetti, “The Eavesdropping Employer,” 303.
Towards Representational Practices of Surveillance
35
Similarly, video or camera surveillance is used in the workplace both to single out people who are
acting suspiciously and also to help observers take pre-emptive action upon detecting some unusual
behaviour.184 It is mainly used by manufacturing and hospitality industries, and cameras serve as
deterrents to loafing around.185 Though such surveillance is primarily intended “to increase safety of
employees by decreasing violence and threatening behaviour and locating workplace risks and to
discourage drug and alcohol use, theft or sabotage, and otherwise to protect employer property and
monitor employee productivity,” it often amounts to an invasion of privacy and may “decrease
employee morale, increase stress, lead to distrust, and decrease productivity.”186 The Automatic Call
Dialing System (ACD), used typically in BPOs and call centres, can feed time and record calls, and
simultaneously tracks administrative work between calls.187 Besides, recording an employee’s
telephone call188 with a third party, which tracks the amount of time spent on calls, the number of
calls dialled, sent, and received, and breaks between giving and receiving calls, etc., though
conducted in the name of quality-control,189 always carry a great risk factor both for the employer
and the employee as well as concerned third parties. For when there is third party participation, the
liabilities of civil litigation may appear on the scene for its assessment. Hence, it is essential to
carefully assess the establishment and use of these surveillance systems and their full impact so that
the hazy lines between the hazard and security can be clarified.
1.3.2 i-Spy: Emergence of Epoch-Making Digitalized Surveillance190
Computer monitoring is likely the most widely used form of surveillance in the workplace,191 as
developments in snooping software products have made it possible to monitor employees and other
persons without their consent or even knowledge that they are being monitored.192 Computer-
184 George Reynolds, Ethics in Information Technology, 2nd ed. (Boston, MA: Thomson Course Technology,
2007), 130. See also Ronald E. Kidwell and Robert Sprague, “Electronic Surveillance in the Global
Workplace: Laws, Ethics, Research and Practice,” New Technology, Work and Employment 24, no. 2 (2009):
194-208; P. Kleve, R.V. De Mulder and K. van Noortwijk, “Surveillance Technology and the Law: The Social
Impact,” International Journal of Intercultural Information Management 1, (2007): 2-16; David Zweig,
“Beyond Privacy and Fairness Concerns: Examining Psychological Boundary Violations as a Consequence
of Electronic Performance Monitoring,” in Electronic Monitoring in the Workplace: Controversies and
Solutions, ed. John Weckert (Hershey: Idea Group Publishing, 2005): 101-122; K. Townsend, “Electronic
Surveillance and Cohesive Teams: Room for Resistance in an Australian Call Center,” New Technology,
Work and Employment 20, no. 1 (2005): 47–59; and J.M. Stanton and E.M. Weiss, “Electronic Monitoring in
Their Own Words: An Exploratory Study of Employees’ Experience with New Types of Surveillance,”
Computers in Human Behaviour 16 (2000): 423-440. 185 Dave Nevogt, “Employee Monitoring Software and Tools - The Top 10 Options,” 2015.
http://blog.hubstaff.com/10-employee-monitoring-software-options-monitor-activity/ [accessed September
28, 2015]. See also, John Kimani Gichuhi, James Mark Ngari and Thomas Senaji, “Employees’ Response to
Electronic Monitoring: The Relationship between CCTV Surveillance and Employees’ Engagement,”
International Journal of Innovative Research & Development 5, no. 7 (2016): 141-150. 186 Ciocchetti, “The Eavesdropping Employer,” 322-324. 187 R. Valsecchi, “Visible Moves and Invisible Bodies: The Case of Teleworking in an Italian Call Centre,”
New Technology, Work and Employment 21, no. 2 (2006): 123-138. See also, Gloria Lankshear, Peter Cook,
David Mason, Sally Coates and Graham Button, “Call Centre Employees' Responses to Electronic
Monitoring: Some Research Findings,” Work, Employment & Society 15, no. 3 (2001), 595-605. 188 Zweig, “Beyond Privacy and Fairness Concerns,” 102. 189 Ciocchetti, “The Eavesdropping Employer,” 321. 190 Mark Andrejevic uses the term iSpy, in his work “iSpy: Surveillance and Power in the Interactive Era,” to
denote the digital enclosure of this rapidly advancing technocratic era. For him it is a new, easy, and persistent
channel of monitoring. See, Mark Andrrejevic, iSpy: Surveillance and Power in the Interactive Era (Kanas:
University Press of Kanas, 2007), 212-240. 191 Ronald E. Kidwell and Robert Sprague, “Electronic Surveillance in the Global Workplace: Laws, Ethics,
Research and Practice,” New Technology, Work and Employment 24, no. 2 (2009): 194-208. 192 Kizza and Ssanyu, “Workplace Surveillance,” 7.
Towards Representational Practices of Surveillance
36
monitoring programmes can record every command and key-stroke sent to the computer by an
employee, translate these signals into data, and remotely transmit this information to the employer,
which can track the opened software applications including tracking passwords and usernames,
taking screenshots, and tracking all open windows.193 The demand for employee monitoring software
products is skyrocketing today, easing the access to persons and information.194 According to Kizza
and Ssanyu, “software products like Investigator, WinWhatWhere, and TrueActive can, once
installed, secretly record all activities conducted on a suspect computer, including Websites visited,
documents created, files deleted, and e-mails received and sent.”195 For instance, facial recognition
software, originally developed to help to identify (criminal) suspects and other such characters, is
now one of the many types of monitoring software used by employers in the workplace.196
The monitoring of e-mails and text messages, implemented via software programmes able to track
the content, timing, volume, and recipients of sent and received messages, is becoming very
common.197 These instant messaging services, which are often private, are scanned to track offenders
and spammers.198 E-mails and text messages are monitored to track productivity, to look for sexual
harassment and discrimination, to look for offensive language and pornography, and to monitor
language for the transmission of trade secrets or other confidential information.199 Filters and
firewalls are also designed to make employees more productive by curtailing non-work related
193 Ciocchetti, “The Eavesdropping Employer,” 307. See also Scott Cox, Tanya Goette, and Dale Young,
“Workplace Surveillance and Employee Privacy: Implementing an Effective Computer Use Policy,”
Communications of the IIMA 5, no. 2 (2005): 57-66; David Zweig, “Beyond Privacy and Fairness Concerns:
Examining Psychological Boundary Violations as a Consequence of Electronic Performance Monitoring,” in
Electronic Monitoring in the Workplace: Controversies and Solutions, ed. John Weckert (Hershey: Idea
Group Publishing, 2005): 101-122; and Sonny S. Ariss, “Computer Monitoring: Benefits and Pitfalls Facing
Management,” Information & Management 39 (2002): 553-558. 194 Sylvia Kierkegaard, “Privacy in Electronic Communication, Watch Your E-mail: Your Boss is Snooping,”
Computer Law & Security Report 21 (2005): 226-236. Monitoring software are easy-to-use free cloud-based
services allowing employers of on-the-job, including on-site and remote workers, to monitor and track.
According to Kizza and Ssanyu, “Wensense, a monitoring software company and one of the big eight
monitoring software developers that also include Baltimore MIMEsweeper, SurfControl, Symatec I-Gear,
Elron Internet Manager, Tumbleweed MMS, N2H2, and Telemate, reported a growth rate of around 33% per
year in 2000.” Kizza and Ssanyu, “Workplace Surveillance,” 2. 195 Kizza and Ssanyu, “Workplace Surveillance,” 8. 196 George Reynolds, Ethics in Information Technology, 2nd ed. (Boston, MA: Thomson Course Technology,
2007), 130. Some software used in today’s workplace are: Accountable2You (offers Windows and Mac
software to record and report applications used and websites visited); Ashnah Ltd. (offers the Windows
application ‘Spysure’ for keylogging, screen capture, and Internet monitoring with versions for home, office
or network); Cogilab (offers the Windows application SurfPass for Internet monitoring, access control, URL
blocking, and time metering for sectors including corporate, education and health); Covenant Eyes (logs
clients’ web usage and sends the end-user and two others a report of the sites visited and time spent online);
Cyclope (Computer monitoring and Internet filtering solutions designed to increase employee productivity);
GigaWatch (records keystrokes typed, applications usage and internet activity on websites and social
networks); and WorkExaminer (offers software for business to track employee Internet usage).
https://www.dmoz.org//Computers/Software/Internet/Monitoring/ [accessed September 20, 2015]. In
addition, there are products like Content Technologies, MIME sweeper, WordTalk World Secure Server,
Elfron Software Message Inspector, Trend Micor emanager and Ten Four TFS Secure Messaging Server, etc.
See Sylvia Kierkegaard, “Privacy in Electronic Communication, Watch Your E-mail: Your Boss is
Snooping,” Computer Law & Security Report 21 (2005): 226-236. 197 Scott Cox, Tanya Goette, and Dale Young, “Workplace Surveillance and Employee Privacy: Implementing
an Effective Computer Use Policy,” Communications of the IIMA 5, no. 2 (2005): 59. See also, Zweig,
“Beyond Privacy and Fairness Concerns,” 101-122. 198 A. Martinez-Balleste and Agusti Solanas, “An Introduction to Privacy Aspects of Information and
Communication Technologies,” World Scientific Review 4, no. 5 (2009): 8. 199 Ciocchetti, “The Eavesdropping Employer,” 308.
Towards Representational Practices of Surveillance
37
activities during work hours.200 The programme of content filtering201 and blocking allows the
supervisor to filter and block content that goes to or from a given host on the network, and then to
remotely freeze or lockup that host when there are dubious activities.202 However, when the tracking
and monitoring of personal mail and messages occurs using these programmes, which are not directly
linked to work-related matters, one’s personal rights are often threatened.
In the same way, ‘Internet and Clickstream Monitoring’203 tracks the web activity of an employee
over a period of time and can range in scope from the minimal to the all-encompassing. This form of
monitoring records each mouse clicks on each web page visited as a user navigates the World Wide
Web. Although employees are restricted from viewing and surfing offensive or otherwise
inappropriate content by this tracking, there is also a tension between employee privacy and employer
interests and potentially a severe curtailment of an individual’s personal freedom of expression. Still
another form of monitoring, called keystroke logging, occurs when key strokes are recorded and
made available to employers, who can access them using a logging programme which allows them
to enter a password and convert keyboard-based activities into text.204 Thus, in keystroke logging and
monitoring, every character that is typed, erased or deleted is logged and secretly sent to the central
monitoring server. Although its results are used to determine employee effectiveness and
productivity, this form of monitoring also flags keywords typical of harassment and bullying.205
Hence, these ever-present ‘watched over’ experiences of people in the organizational workplace are,
technically, brought into the i-spy syndrome,206 which again produces multiple challenges of
enclosure and disclosure. This problem of the digital enclosure and disclosure of ‘omnipresent’
surveillance, technically called the ubiquitous interactivity of the wired world, which mainly
comprises the commodification of the information, 207 will be critically analysed in the next part of
this paper.
The most recent and readily affordable forms of employee monitoring track social networking and
search engine use.208 This enables an employer to find, together with essential information about
their employees, various salacious or negative information about them, since the primary purpose of
these social networking sites is to publish personal information.209 Misuse of this information is today
200 Ciocchetti, “The Eavesdropping Employer,” 309. 201 Cox, Goette, and Young, “Workplace Surveillance and Employee Privacy,” 60. 202 Kizza and Ssanyu, “Workplace Surveillance,” 9. 203 Every session of web surfing generates a massive amount of personal information about a web surfer.
Clickstream analysis is the process of collecting, analyzing, and reporting aggregate data of the pages browsed
by a visitor on the web. This is possible because, whenever a user clicks anywhere in the webpage or
application, this action is logged on a client or inside the web server, as well as possibly the web browser or
the router. Along with its use of web activity analysis, it also used to analyze market research and employee
productivity and so forth. Hence, clickstream data are defined as the electronic record of Internet usage
collected by Web servers or third-party services. Randolph E. Bucklin and Catarina Sismeiro, “Click Here
for Internet Insight: Advances in Clickstream Data Analysis in Marketing,” Journal of Interactive Marketing
23, no. 1 (2009): 35-48, 36. 204 Ciocchetti, “The Eavesdropping Employer,” 315. 205 Ciocchetti, “The Eavesdropping Employer,” 316. 206 Mark Andrejevic, “Surveillance in the Digital Enclosure,” The Communication Review 10, no. 4 (2007):
295-317. 207 Andrejevic, “Surveillance in the Digital Enclosure,” 297. 208 Ciocchetti, “The Eavesdropping Employer,” 320. 209 For instance, social networks such as Facebook, Twitter, and LinkedIn are now increasingly used to pass
and gather information. Facebook, for example, encourages its users to upload all personal information with
more intimate details on their profile page which cannot be taken back even if one wishes to do so, and
collects all this data into a central repository of information which is archived persistently and cumulatively.
In this way, sensitive and potentially damaging information is made public, such as users’ health conditions
or treatments, their birth dates (which could be used for identity theft), plans to take an outing on certain day
Towards Representational Practices of Surveillance
38
quite common. Employers now widely utilize these sites to screen potential and current employees
as these networks grow increasingly pervasive. In the workplace, information from social network
sites, particularly Facebook, MySpace, Twitter, and LinkedIn, is tracked to filter employees on the
basis of their attitudes and aptitudes, which many holds infringes their autonomy and privacy. In the
same way, a word or a phrase entered a search engine is stored and could be released in the future.210
Though the quality of search results is amazing and progressively viewed and experienced as time-
saving, the concerned people are anxious about the personal information collected by search engines.
In this respect, given the huge amount of storage space available, companies and organizations save
enormous amounts of data about and their employees’ activities.
Cookies also function in this way. Cookies are files, small pieces of information that a web site stores
on a visitor’s computer. Within each cookie, the site stores, and then uses, the information about the
visitor’s activity.211 Cookies are used to track user preferences, habits, and identity. A central third
party, such as an internet marketing company, can track users across several websites and create
precise profiles of their interests. Likewise, spyware, small pieces of software installed on a computer
often without the consent of the user, have the same capacity to send information to a remote
database. They also determine and establish the user’s habits.212 Both cookies and spyware can be
used in the workplace to track employees’ activities on many web sites, which could be later retrieved
for manipulative uses.
1.3.3 Location-Based Services: From ‘on-the-job’ to ‘off-the-job’ Surveillance
Advances in mobile networking and positional technologies allow for what is called “ubiquitous
computing”213 and encourages information systems to interact in different locations. Location-Based
(which could be traced by burglars), finance status, ethnic, racial or religious affiliations, sexual orientations,
recreational use of alcohol, and so forth. See Tonis Vassar, “Privacy Concerns Regarding Social Networking
Services,” Privacy Issues of Social Networks, http://social-networks-privacy.wikidot.com/ [accessed March
12, 2015]. The risk lies here since this information can be accessed and further processed by virtually every
member of the social networks. LinkedIn, in the same vein, is a widely-used professional connection tool that
is currently the largest business-oriented social and professional networking, making it a huge platform for
connecting and sharing. It is used by recruiters and sales professionals, given that LinkedIn users, who share
both personal and professional information on this system, both want to be visible to recruiters and also hope
to find customers. Inadvertently blurting out confidential data in the system can damage the reputation of
one’s company or oneself and the content published could be used as a parameter to hire, deny promotion or
to terminate employees. 210 Search engines have the capacity to collect many terabytes of data daily. A terabyte is a trillion bytes. It
would have been absurdly expensive to store so much data in the recent past, but no longer. See Sara Base, A
Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet. 3rd ed. (New Jersey: Pearson
Prentice Hall, 2009), 64. 211 Base, A Gift of Fire, 64. 212 Spyware often comes bundled with free software and automatically gets installed as browser helpers or
toolbars. It ultimately slows down the system and causes pop-up and advertisements at random, which
negatively affects the user, causing a lag in his work time. Martinez-Balleste and Solanas, “An Introduction
to Privacy Aspects of Information and Communication Technologies,” 9-12. 213 Computing technology is developed today in such a way that these means are available anywhere anytime,
anyone, completely interconnected, embedded in different environment, and has become the fabric of
everyday life. See https://www.ics.uci.edu/faculty/area/area_ubi.php [accessed September 18, 2015].
Ubiquitous Computing is defined as “a paradigm in which the processing of information is linked with each
activity or object as encountered. It involves connecting electronic devices, including embedding
microprocessors to communicate information. Devices that use ubiquitous computing have constant
availability and are completely connected.”
https://www.techopedia.com/definition/22702/ubiquitous-computing [accessed September 18, 2015]. One of
the ever-challenging risks of this ubiquitous computing is that the “timely and accurate location data for an
individual (both real-time and historical) [will be] made available.” Blaine A. Price, Karim Adam, and Bashar
Towards Representational Practices of Surveillance
39
Services (LBS) integrate the geographic location of an entity, human or nonhuman, with the notion
of a service.214 LBS are significantly related to ubiquitous computing and, by means of mobile
devices and fixed network infrastructure, allow people to locate others in range.215 Global Positioning
System (GPS) chips, an emerging technique of LBS, are being placed in many employee devices,
from automobiles to cell phones, in order to locate employees and track their movements.216 Even
the wireless appliances employees carry almost always contain a global positioning system and other
location devices that enable others, such as employers, to determine a person’s location and track his
or her movements.217 Along with GPS, Radio Frequency Identification (RFID) is also now often
used to track employees.
RFID devices in general “allow objects to be identified without visual contact and help in improving
and automating many processes.”218 Many objects today carry a tag and RFID readers integrate these
RFID tags with information systems. By using “several readers strategically deployed, the location
of tags can be tracked and consequently, the motion of the scanned people.”219 RFID tracks the
precise location of individuals or objects on a real-time basis can be known by triangulating satellite
signals.220 Real-time recording and surveillance is possible using these system trackers.221 These
devices can track them down at any time and even determine where they were at a particular time in
the past. In this regard, tracking devices shift or extend the surveillance practices from ‘on-the-job’
to ‘off-the-job’ particulars, and in this pose a major privacy invasion when employers track the off-
duty behaviour of employees. More critical reflections on the use and effect of these advanced
electronic devices will be offered in the next section, where we analyse the impacts of these
procedures, particularly in organizational behaviour. In the following, we will first consider the
theoretical arguments in favour of surveillance, then elaborate this my examining the effect of
surveillance in the workplace.
1.4 REASONS AND LOGICAL MEASURES BEHIND THE WORKPLACE SURVEILLANCE
This section identifies and examines the anticipated and widely accepted specific justifications of
surveillance. We divide these into three groups. We have perceived that employers adopt and adapt
a wide range of techniques and methods to monitor and learn the particulars – facts and specifics –
of employees and often unwanted access to their lives and information. Companies have valid
Nuseibeh, “Keeping Ubiquitous Computing to Yourself: A Practical Model for User Control of Privacy,”
International Journal of Human-Computer Studies, 63, nos. 1-2 (2005): 229. 214 Iris A. Junglas and Richard T. Watson, “Location-Based Services: Evaluating User Perceptions of Location-
Tracking and Location-Awareness Services,” Communications of the ACM 51, no. 3 (2008): 66. See also,
Jochen Schiller and Agnes Voisard, eds., Location-Based Services (San Francisco, CA: Morgan Kaufmann
Publishers, 2004), 1. Schiller and Voisard perceive Location-Based Services as “a recent concept that denotes
applications integrating geographic location (i.e., spatial coordinates) with the general notion of services.” It
allows one to acquire, for instance, location-based rout guidance and tourist information. Martinez-Balleste
and Solanas, “An Introduction to Privacy Aspects of Information and Communication Technologies,” 12. 215 Kidwell and Sprague, “Electronic Surveillance in the Global Workplace: Laws, Ethics, Research and
Practice,” 194-208. See also, D. Kushner, “Big Brother at Work,” IEEE Spectrum 41, no. 12, (2004): 57–58. 216 Reynolds, Ethics in Information Technology, 131. 217 Base, A Gift of Fire, 64. 218 Martinez-Balleste and Solanas, “An Introduction to Privacy Aspects of Information and Communication
Technologies,” 14. 219 Martinez-Balleste and Solanas, “An Introduction to Privacy Aspects of Information and Communication
Technologies,” 14. 220 Ciocchetti, “The Eavesdropping Employer,” 310. 221 It is called real-time surveillance because in several ways, including the use of very small Internet cameras
that record and transmit real-time pictures over the internet, it continuously tracks employee activities. Kizza
and Ssanyu, “Workplace Surveillance,” 9-10.
Towards Representational Practices of Surveillance
40
reasons and argue about their responsibility to provide safe and secure ambiance and unbiased
environment in the workplace.222 As Findlay and McKinlay observe, “employers regard control of
the workplace as their prerogative, including the right to protect and control their property, and the
right to supervise and manage employee performance in terms of productivity, quality, training, and
the recording of customer interactions.”223 In addition to that, employers are liable for employees’
actions, done with or without employers’ consent, during the time of employment.224 But why are
they so fixated or sometimes preoccupied with this? Surveillance will be accepted or rejected
depending on whether it is regarded, on the one hand, as a legitimate technology that allows managers
to care for everyone’s interests, or, on the other, as a powerful instrument of managerial coercion and
employee subordination.225
The most powerful legitimation of employer surveillance is to “guard the organization against crime,
fraud, theft, and to protect the integrity of business-critical information systems.”226 Surveillance
may also appear vindicated when one considers its productive and disciplinary powers;227 it can
discourage undesirable behaviours and promote desirable ones.228 We understand workplace
surveillance at this moment to mean “any systematic monitoring by management of individual
employees’ job performance, where carried out with an eye to ensuring compliance with
management expectations.”229 Yet to determine what constitutes an acceptable form of surveillance,
morally and rationally, is a matter of great concern. It is, therefore, all the more essential and
indispensable to consider some normative statements made by advocates of workplace surveillance
about the main purposes of the surveillance practices and the legitimate and rational arguments for
the same in the workplace. We group together and examine several of the most illuminative factors
contributing to and fuelling this organizational surveillance.
1.4.1 Promoting Measures: General Causative Factors of Surveillance
First and foremost the possibility of monitoring exists,230 and then, falling prices of its devices and
the experienced sweeping descent of the vendor ratio (the average price per monitored employee)
encourage the use of such technological means in the workplace.231 In other words, the
miniaturization of monitoring products and their user-friendliness enable anyone in reach to use these
technologies without much technical know-how.232 The principle that lies behind this is recognized
as ‘less costly and easier to implement’ in today’s tech-world. It is widespread also because some
222 Zweig, “Beyond Privacy and Fairness Concerns,” 112. See also, Carl Botan and Mihaela Vorvoreanu,
“What Do Employees Think about Electronic Surveillance at Work?” in Electronic Monitoring in the
Workplace: Controversies and Solutions, ed. John Weckert (Hershey: Idea Group Publishing, 2005): 123-
144; Sonny S. Ariss, “Computer Monitoring: Benefits and Pitfalls Facing Management,” Information &
Management 39 (2002): 553-558. 223 Findlay and McKinlay, “Surveillance, Electronic Communications Technologies and Regulation,” 306. 224 Samantha Lee and Brian H. Kleiner, “Electronic Surveillance in the Workplace,” Management Research
News 26, nos. 2, 3, 4 (2003): 73. 225 Sewell and Barker, “Coercion versus Care,” 934-935. 226 Findlay and McKinlay, “Surveillance, Electronic Communications Technologies and Regulation,” 310. 227 Eivazi, “Computer Use Monitoring and Privacy at Work,” 516-523. See also Ball, “Workplace Surveillance:
An Overview,” 87-116. 228 H. Oliver, “Email and Internet Monitoring in the Workplace: Information Privacy and Contracting-Out,”
Industrial Law Journal 31, no. 4 (2002): 321–352. See also Sewell and Barker, “Coercion versus Care,” 934-
935. 229 James Rule and Peter Brantely, “Computerized Surveillance in the Workplace: Forms and Distributions,”
Sociological Forum 7, no. 3 (1992): 410. 230 Vorvoreanu and Baton, “Examining Electronic Surveillance in the Workplace,” 8. 231 Kizza and Ssanyu, “Workplace Surveillance,” 2-6. 232 Stanton, “Traditional and Electronic Monitoring from an Organizational Justice Perspective,” 129.
Towards Representational Practices of Surveillance
41
employers anticipate that monitored employees will be more productive than unmonitored ones,233
even though there are studies purporting to prove both sides. The legal permission of conducting
surveillance for business purposes in many countries persuades and often favours employers.234 For
instance, Telecommunications Regulations 2000 provides ample opportunity to monitor employees
when this is done for the reasons of recording evidence of a business transaction, ensuring
compliance with regulatory or self-regulatory guidelines, maintaining training or service and
effective operations of the employer’s systems and preventing unauthorized use of the workplace
technologies.235 Jessica Fink observes that “the courts have adopted a surprisingly permissive attitude
toward employer snooping, issuing decisions that leave employers with broad leeway to monitor
employees without any legal sanction.”236
The over-sharing mentality of employees through social media and networks, such as Facebook and
LinkedIn, encourages employers to peer into their employees lives, often because of today’s display
culture.237 In the same vein, reputational concerns on the part of the employer motivate employee
monitoring, as there are ample opportunities and occasions where an employee may represent his/her
employer in many respects.238 There seems also to be a financial motivation for snooping, which
plays a large role during the hiring process itself.239 An employer’s reputation is more vulnerable to
disparaging statements or mischaracterizations by their employees. Apart from the expensive
endeavour of interviewing and recruiting, employers may end up wasting considerable resources due
to poor hiring decisions. Hence, researchers observe that responsible managers will conduct such
easy and cost-effective due diligence internet searches for potential employees before hiring or
promotion.240 In a similar manner, employers are keen to maximize profitability and efficiency, and
many believe they can do so in part by employee monitoring. Financial motives thus include avoiding
direct financial harms and protecting trade secrets and strategies. Therefore, monitoring in lieu of
promoting profit is a commonplace in today’s work scenario.
1.4.2 Proliferating Measures: Coercive Control and Caring
Monitoring is used in effect as a supervisory resource.241 It can be approached from two perspectives:
coercion and care. In this regard, the concept of ‘coercion,’ which is an act or practice of compelling
someone to do something through the use of force or threats, is seen as a radical perspective on
organizational surveillance, whereas the concept of ‘care’, which is an effort to do something
correctly, safely, or without causing damage, is viewed as a more liberal perspective on the same.242
233 Ball, “Workplace Surveillance: An Overview,” 87-106. See also, Kizza and Ssanyu, “Workplace
Surveillance,” 1-18. 234 Findlay and McKinlay, “Surveillance, Electronic Communications Technologies and Regulation,” 306-307. 235 “Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000,”
http://www.legislation.gov.uk/uksi/2000/2699/pdfs/uksi_20002699_en.pdf [accessed September 28, 2015]. 236 Jessica Fink, “In Defense of Snooping Employers,” University of Pennsylvania Journal of Business Law
16, no. 2 (2014): 582. Jessica Fink, Associate Professor in California Western School of Law, corroborates
these legal permissions with substantial proofs referring handful of cases (e.g., City of Ontario v. Quon) where
the courts create strong incentives and encourages employers to snoop into their employees, and some of
which even failed to establish clear legal guidelines and boundaries regarding what can and cannot do in the
surveillance practices (Fink 2014). 237 Fink, “In Defense of Snooping Employers,” 581. 238 Fink, “In Defense of Snooping Employers,” 577. 239 Fink, “In Defense of Snooping Employers,” 570. 240 Fink, “In Defense of Snooping Employers,” 559-563. See also, Ball, “Workplace Surveillance: An
Overview,” 87-106. 241 Zweig, “Beyond Privacy and Fairness Concerns,” 112. 242 Sewell and Barker, “Coercion versus Care: Using Irony to Make Sense of Organizational Surveillance,”
938-940.
Towards Representational Practices of Surveillance
42
According to Myria W. Allen, “coercive control assumes that surveillance is needed to expose and
coerce unruly or deviant employees to constantly work hard.”243 Moreover, the resurgence of interest
in Labour Process Theory (LPT) 244 has played a role in bringing forth the idea of managerial control
as a form of coercion. According to Sewell and Barker, “the organizational surveillance of the few
watching the many is justified because it enables a small number of managers to exercise control
over a larger and potentially unruly mass of employees through the monitoring of individual
behaviour.”245 Yet we cannot simply overlook the risks of surveillance, allowing the more powerful
to dominate the less powerful as surveillance technologies become more convenient and easier to
employ. Marx rightly points out that “it is more likely to involve manipulation than direct
coercion.”246 For, the potentially self-serving desires of powerful employers may threaten and
intimidate their less privileged employees in even undemanding matters. The principle of
‘employment at will’247 also gives employers the legal freedom and justification to execute
surveillance.248
By contrast, a care-inspired understanding of surveillance focuses on its potentially positive practical
aspects, such as its fairness, effectiveness, and possibility it offers of drawing a clear boundary in
terms of its intrusions.249 For surveillance as a form of caring assumes that “surveillance protects the
many from the disruptive, lazy, or incompetent few.”250 Sewell and Barker argue in this regard that:
[O]rganizational surveillance could be legitimate as long as (1) it prevents antisocial individuals
from taking advantage of the organization and their colleagues, (2) its operation is invested in the
hands of an impartial third party who mediates the relationship between the principal and the
243 Myria Watkins Allen, et al., “Workplace Surveillance and Managing Privacy Boundaries,” Management
Communication Quarterly 21 (2007): 174-175. 244 Labour Process Theory generally analyses how a workforce’s labour power (its ability to work) is directed
towards the production of commodities (goods and services). Profit is the basis of this process, which is
accumulated through the extraction of the surplus value of labour. Here, managers try to control, on the one
hand, the way work is organized, and on the other hand, the pace and duration of work, which are crucial to
profitability. See “Labour Process Theory,” http://www.answers.com/topic/labor-process-theory [accessed
November 28, 2014]. 245 Sewell and Barker, “Coercion versus Care,” 938. 246 Marx, “What’s New about the ‘New Surveillance’?” 88. 247 The doctrine of employment at will is “based on the idea that the employer had the right to set virtually any
condition of employment for those who accept his wages, and to fire any worker for any reason.” H. Donnelly,
“Privacy in the Workplace,” Editorial Research Reports 1, no. 11 (1986): 218-219. We cited this from: Botan
and Vorvoreanu, “What Do Employees Think about Electronic Surveillance at Work?” 126. See also, Charles
J. Muhl, “The Employment-at-Will Doctrine: Three Major Exceptions,” Monthly Labour Review (2001): 3. 248 The Industrial Revolution planted the seeds for the erosion of the employment-at-will doctrine. When
employees began forming unions, the collective bargaining agreements they subsequently negotiated with
employers frequently had provisions in them that required just cause for adverse employment actions, as well
as procedures for arbitrating employee grievances. The employment-at-will doctrine avows that, when an
employee does not have a written employment contract and the term of employment is of indefinite duration,
the employer can terminate the employee for good cause, bad cause, or no cause at all. Traditionally, and as
recently as the early 1900s, courts viewed the relationship between employer and employee as being on equal
footing in terms of bargaining power. Thus, the employment-at-will doctrine reflected the belief that people
should be free to enter into employment contracts of a specified duration, but that no obligations attached to
either employer or employee if a person was hired without such a contract. Because employees were able to
resign from positions they no longer cared to occupy, employers also were permitted to discharge employees
at their whim. Muhl, “The Employment-at-Will Doctrine: Three Major Exceptions,” 3. See also D’Urso,
“Who’s Watching Us at Work,” 288-303. 249 Sewell and Barker, “Coercion versus Care,” 938-940. 250 Allen, et al., “Workplace Surveillance and Managing Privacy Boundaries,” 175.
Towards Representational Practices of Surveillance
43
agent; and (3) all members of the organization both recognize the reasonableness of surveillance
as a course of action and trust in the impartiality of those responsible for its operation.251
Nevertheless, though surveillance as coercive control and as caring, discussed here, seem to provide
the best arguments for its vindication, its justification must be further discussed given the unresolved
problems of curtailed freedom, power suppression, and constrained behavioural patterns due to
anxiety, fear and irrational stress. For even the argument based on care, outlined here, still remains,
and in some cases leaves employees with an attitude of distrust. Its singular application thus seems
insufficient, again, since it lacks empirical accuracy and encourages the possibility of sliding into a
kind of sentimentality.
1.4.3 Prophylactic Measures: Productivity, Security, and Liability Alleviation
Employee monitoring and control developed alongside the evaluation of workplace design and is
symptomatic of changing technologies that often limit or reduce employee autonomy and
concentration to a managing elite.252 Referring to the rule of the ‘Taylorist system,’253 namely that
the unobserved worker is an inefficient one, Nikil Saval writes that monitoring prevents workers
from sabotaging and disrupting the modes of production.254 Surveillance motivates employees to
work hard. For managers are able to fairly evaluate performance by obtaining a clear picture of
employee actions and outcomes through monitoring, and the timely intervention of managers, when
needed, can alleviate unwanted tension over the expected productivity.255 Yet a kind of natural
curiosity about what others do256 also motivates surveillance, and most important for our subject of
interest here are its legal and economic frameworks.257
Prophylactic measures of surveillance are also meant to prevent legal exposure. The most serious
problem that a company faces is the danger of economic loss due to a misuse of resources.258 A
251 Sewell and Barker, “Coercion versus Care,” 940. 252 Alex Rosenblat, Tamara Kneese, and Danah Boyd, “Workplace Surveillance,” Data & Society Working
Paper, prepared for: Future of Work Project supported by Open Society Foundations, Data &Society
Research Institute, 2014. http://www.datasociety.net/pubs/fow/WorkplaceSurveillance.pdf [accessed
October 15, 2015]. 253 Frederick Winslow Taylor, whose mission was to map the knowledge of how a task was done by identifying,
fragmenting and regimenting workflows and deploy methods of ‘performance monitoring’ to reach
production targets (Graham Sewell, “Nice Work? Rethinking Managerial Control in an Era of Knowledge
Work,” Organization 12, no. 5 (2005): 691), was a measurement-obsessed mechanical engineer and an
efficiency consultant to various businesses in the United States. He gave an actionable answer to the question
of what structures and technologies can ensure efficiency and integrity in the organization of business and
labour. Elia Zureik, “Theorizing Surveillance: the Case of the Workplace,” in Surveillance as Social Sorting:
Privacy, Risk, and Digital Discrimination, ed. David Lyon (New York and London: Routledge, 2003), 48. 254 Nikil Saval, Cubed: A Secret History of the Workplace (New York, NY: Doubleday, 2014), 42. 255 Lee and Kleiner, “Electronic Surveillance in the Workplace,” 78. 256 G. Gumbert and S.J. Drucker, “The Demise of Privacy in a Private World,” in Cyberethics: Social and
Moral Issues in the Computer Age, ed. R.M. Baird, R. Ramsower and S.E. Rosenbaum (New York:
Prometheus Books, 2000), 171-197. 257 Bernd Carsten Stahl, et al., “Electronic Monitoring in the Workplace: If People Don’t Care, Then What is
the Relevance?” in Electronic Monitoring in the Workplace: Controversies and Solutions, ed. John Weckert
(Hershey: Idea Group of Publishing, 2005), 64. See also D’Urso, “Who’s Watching Us at Work,” 285. 258 Bernd Carsten Stahl and others view that the “abuse of company resources includes accessing irrelevant
Websites, chatting, gaming, downloading mp3 files, etc. and this problem is sufficiently serious to warrant
the invention of new terms to denote it, terms such as ‘cyber-slacking’ or ‘cyber-slouching’” (Stahl, et al.,
“Electronic Monitoring in the Workplace,” 64). This phenomenon is also called “cyber-loafing.” Cyber-
loafing generally refers to “the actions of employees who use their internet access at work for personal use
while pretending to do legitimate work.” Today, terms such as cyber-slacking, cyber-bludging and cyber-
slouching are also used to portray the phenomenon of cyber-loafing. See
Towards Representational Practices of Surveillance
44
majority of scholars, including McHardy et al.,259 hold that employee monitoring leads to greater
organizational security, as “corporations that do not adequately secure their systems risk unwanted
dissemination, retrieval, or modification of private information.”260 When this information is
monitored, security breaches can be detected and halted.261 Fraudulent activity is also a real risk here,
as employees possess and have access to sensitive personal and organizational information, which
could be misused or sold to a third party, in either case causing heavy liabilities for employers.262
Therefore, the top reported reasons for surveillance concern performance, productivity, and security.
Video camera surveillance, for example, is particularly used to minimize theft, curtail sabotage263
and thwart vandalism.264 Christopher McHardy and others are of the same opinion that “increasing
attacks, robberies, violence, workplace mishaps, other workplace safety issues, and associated
liabilities and damages provide motivation for employers to monitor the workplace.”265 There is also
a possibility that proprietary information about business strategy data integrity and consumer
confidentiality might be revealed. In other words, safeguarding confidential information and
potential legal liability resulting from employee computer misuse or misconduct are often regarded
as key motivating factors for employee monitoring. Thus, monitoring becomes a risk-management
tool and is used to limit cost and risk, protect value and maintain quality.266 Though employers
regularly offer employees incentives and enticements to legitimately induce them to submit to
monitoring and snooping, these approaches do not mean that employees should agree that all facets
of their private lives should be monitored.
To wrap up this discussion of contributing factors, we can say that the workplace has become a
carefully observed space, with the ‘sharp-eyed watchdogs’ of various mechanisms being used to
ensure a lawsuit-proof workplace. Trends such as financial pressures and risk factors have driven the
http://www.techopedia.com/definition/2390/cyberloafing [accessed December 5, 2014]. See also, J.M.
Stanton and E.M. Weiss, “Electronic Monitoring in Their Own Words: An Exploratory Study of Employees’
Experience with New Types of Surveillance,” Computers in Human Behaviour 16 (2000): 424; Botan and
Vorvoreanu, “What Do Employees Think about Electronic Surveillance at Work?” 123-144; and S. Elizabeth
Wilborn, “Revisiting the Public/Private Distinction: Employee Monitoring in the Workplace,” Georgia Law
Review 32 (1998): 825-887. It is also to be noted that, according to Kizza and Ssanyu, 29.2% monitor for
productivity, simply because many believe that employees spent a lot of time doing their own thing while at
work, and 3.1% monitor to prevent personal use of company computers and other articles for unproductive
activities. 29.2% monitor for theft of company property, while 21.5% monitor for espionage. In addition to
this, while security is an economically motivated argument for surveillance, as it is believed to discourage
misuse, prevent theft, secure proper access, etc., other reasons are also given prime importance, such as
performance review (9.2%) and harassment prevention (6.2%), both between employers and employees and
among employees. Kizza and Ssanyu, “Workplace Surveillance,” 5-6. 259 Cristopher McHardy, Tina Giesbrecht and Peter Brady, “Workplace Monitoring and Surveillance,”
McCarthy Tétrault, 2015. http://www.mccarthy.ca/pubs/Monitoring_and_Surveillance.pdf [accessed
October 2, 2015]. Part of this paper, prepared by Christopher McHardy, is adapted from “New Privacy
Legislation in the Workplace: Issues of Surveillance and Monitoring” authored by Nancy A. Trott and Rosalie
A. Cress. 260 Kristen Martin and R. Edward Freeman, “Some Problems with Employee Monitoring,” Journal of Business
Ethics 43 (2003): 354. 261 Mark Sanderson, “Big Brother’s Day at the Office,” Computer Fraud and Security 12 (2000): 9-11. 262 Rohnda Turner, “Employee Monitoring: An Essential Component of Your Risk Management Strategy,”
Deep Software (2007): 4. See http://www.softactivity.com/employee-monitoring-softactivity.pdf [accessed
December 5, 2013]. See also, S. Elizabeth Wilborn, “Revisiting the Public/Private Distinction: Employee
Monitoring in the Workplace,” Georgia Law Review 32 (1998): 825-887. 263 Frederick S. Lane III, The Naked Employee: How Technology is Compromising Workplace Privacy (New
York: Amacom, 2003), 11-12. 264 Stanton and Weiss, “Electronic Monitoring in Their Own Words,” 424. 265 McHardy, Giesbrecht and Brady, “Workplace Monitoring and Surveillance,” 2005. 266 Ball, “Workplace Surveillance: An Overview,” 93.
Towards Representational Practices of Surveillance
45
increase in monitoring. All these types of monitoring practices noted above, as Al-Rjoub and others
have demonstrated, can be grouped into various categories: those which focus on performance
(measuring time used on computer, keystrokes, content on telephone, etc.), those which focus on
employee behaviour (measuring the resources usages, error predisposition, location tracking, etc.),
those which focus on employee characteristics (truthfulness, state of health, etc.).267 Though the
predominance of surveillance is often justified in terms of the reasons stated above, namely to
improve employee behaviour and create a peaceful and encouraging environment in the workplace,
they are often regarded as minimum standard motives compared to the impacts and consequences of
their results.
1.5 THE AFTERMATH: PROS-CONS POLEMICS OF WORKPLACE SURVEILLANCE
This section surveys the desired and undesired effects of surveillance practices and the issues to
which they give rise. Since employers and employees possess different rights and interests that often
appear in contrast to one another in particular situations, the efficacy of this practice is determined
by considering the impacts and consequences and the goals achieved. For judicious employers who
are suspicious of their employees may strike against cautious employees with a palliative sentiment
in any milieu. An American Management Association Survey examining workplace surveillance
practices at different levels is also reviewed in order to capture the entire picture that is prevalent
today.
1.5.1 The Expected Benefits of Surveillance
Many of the reasons for or causative factors of surveillance, which we have discussed above, appear
as its benign effects as well. Surveillance is regarded as a management technique useful in ensuring
quality service and increased productivity268 and guaranteeing protection from theft, legal liabilities
and over expenditures due to fraud, dishonesty, or misconduct.269 For instance, software filters used
in computers restrict online shopping and the use of social networks during work hours. A GPS
device in a vehicle, in the same way, allows dispatchers to give specific location directions to the
drivers.270 Systems of surveillance track employees’ positions in time and space and expose
employees who are ‘working hard’ and those who are ‘not pulling their weight.’271 Monitoring
employee internet use ensures that employees use it only for employment related activities. It also
obstructs external encroachment by way of data transactions and blocks the sensitive, confidential
267 Hamed Al-Rjoub, Arwa Zabian and Sami Qawasmeh, “Electronic Monitoring: The Employees Point of
View,” Journal of Social Sciences 4, no. 3 (2008): 190. 268 Sewell and Barker, “Coercion versus Care,” 939. See also, Julie A. Flanagan, “Restricting Electronic
Monitoring in the Private Workplace,” Duke Law Journal 43, no. 6 (1994): 1260; Michael Levy,
“Electronic Monitoring in the Workplace: Power through the Panopticon,”
http://besser.tsoa.nyu.edu/impact/s94/students/mike/mike_paper.html [accessed October 12, 2015]; R.L.
Worsnop, “Privacy in the Workplace,” CQ Researcher (1993, November 19): 1025. 269 Allen, et al., “Workplace Surveillance and Managing Privacy Boundaries,” 175, 186. See also Findlay and
McKinlay, “Surveillance, Electronic Communications Technologies and Regulation,” 306-309; Seumas
Miller and John Weckert, “Privacy, the Workplace and the Internet,” Journal of Business Ethics 28 (2000):
256; and Jitendra M. Mishra and Suzanne M. Crampton, “Employee Monitoring: Privacy in the Workplace?”
S.A.M. Advanced Management Journal 63, no. 3 (1998): 4-15. 270 Richard Alaniz, “The Advantages and Pitfalls of Employee Monitoring,” Fleet Financials, 2008.
http://www.fleetfinancials.com/article/story/2008/07/the-advantages-and-pitfalls-of-employee-
monitoring.aspx [accessed October 12, 2015]. 271 Sewell and Barker, “Coercion versus Care,” 939.
Towards Representational Practices of Surveillance
46
and sometimes dangerous information being received or sent outside of the company.272 Monitoring
employee phone calls gives insight into how employees interact with their colleagues.
A study conducted by Allen et al. regarding workplace surveillance, collecting data from 154 face-
to-face interviews with employees from a range of organizations in the United States, reveals that
68% of respondents feel that the surveillance is beneficial, while 17% gave a mixed reaction, 10%
appeared ambivalent and 6% were sad. However, among those who indicated surveillance as
beneficial or necessary, 74% are managers while only 26% are non-managers.273 This means that,
from management perspectives, employee monitoring is needed to sustain a competitive and
productive workplace. Although the obvious beneficiary of employee monitoring is the
employer/management, since monitoring complies with set policies and improves quality and
performance, it also can be quite useful to employees as it motivates them to do their jobs more
effectively and make them feel accountable in their work. For the data collected through monitoring
is increasingly used to coach employees for better and more accurate performance and behaviour in
the workplace.274 Along with improving work practices, it enables companies to “get rid of ‘dead
wood’, workers who are not doing their fair share of the work.”275 According to Michale Smith and
Benjamin C. Amick, “monitoring, and its related motivational process such as feedback, goal setting
and performance evaluation, are keys to the success of electronic workplace enhancement.”276 It leads
to more objective and fact-based feedback and performance appraisal.277 Effective monitoring thus
provides effective feedback and improved performance. In addition, providing an unbiased
evaluation and preventing emotional break ups is said to be another major advantage of electronic
monitoring.278 It also marks the accuracy of the information collected and the generality of the system
commonly used to gather data.
Electronic monitoring systems allow businesses to have good transactions, avoid mortgages and
liabilities, conduct needed investigations and interactions, and help to ensure their success in a
competitive global environment. In the computer monitoring debate, Sonny S. Ariss argues in favour
of surveillance, saying: it prevents misuse of company resources; ensures that company security is
not breached; guards against legal and economic liabilities resulting from employee communication
and other activities; and keeps performance up to par.279 Also, Julie A. Flanagan opines that
computer-based monitoring can “chart future workloads to increase productivity [...] reduces the
need for managers to give personal attention to employees because computer can provide feedback
[...] and can improve compliance with company policies and safety guidelines.”280 In studying
employee behaviour as a psychological scientist, Devasheesh P. Bhave, found an association of high
performance with employee monitoring and writes that workers monitored more frequently perform
272 Bahaudin G. Mujtaba, “Ethical Implications of Employee Monitoring: What Leaders Should Consider,”
Journal of Applied Management and Entrepreneurship 8, no. 3 (2003): 34. 273 Allen et al., “Workplace Surveillance and Managing Privacy Boundaries,” 183. 274 Miller and Weckert, “Privacy, the Workplace and the Internet,” 259. See also, K.B. DeTienne, “Big Brother
or Friendly Coach,” Futurist 27 (1993): 33-37. 275 Miller and Weckert, “Privacy, the Workplace and the Internet,” 260. 276 Michale J. Smith and Benjamin C. Amick III, “Electronic Monitoring at the Workplace: Implications for
Employee Control and Job Stress,” in Job Control and Worker Health, ed. Stephen L. Sauter, Joseph Hurrell
and Cary Cooper (Chichester: Wiley, 1990), 285. 277 Zweig, “Beyond Privacy and Fairness Concerns,” 114. See also, B.P. Neihoff and R.H. Moorman, “Justice
as a Mediator of the Relationship between Methods of Monitoring and Organisational Citizenship
Behaviour,” Academy of Management Journal 36 (1993): 527-556. 278 Miller and Weckert, “Privacy, the Workplace and the Internet,” 260. See also Worsnop, “Privacy in
the Workplace,” 1025. 279 Ariss, “Computer Monitoring: Benefits and Pitfalls Facing Management,” 555-556. 280 Flanagan, “Restricting Electronic Monitoring in the Private Workplace,” 1260-1262.
Towards Representational Practices of Surveillance
47
better than unmonitored workers.281 Nevertheless, he continues that “although the results of this study
indicate a positive association between supervisory use of Electronic Performance Monitoring and
employee performance dimensions, excessively high levels of [... its] use may be detrimental to
employee performance on account of fairness and autonomy concerns.”282 Similarly, even without
advanced electronic intimation, there is an automatic electronic trail created by all transactions done
in and through the internet and other electronic devices that allow others to peep into our lives at any
time they wish. This is a discomforting fact that both employers and employees often forget. The
Exhibit-2 below charts the main contributors of electronic surveillance in the organizational
workplace.
Exhibit-2 Contributors and Benefits of Electronic Surveillance
The 2009 Electronic Business Communication Policies & Procedures Survey283 surprisingly suggests
the relevance of employers’ security concerns, citing that 14% of employees admit to misusing
281 Bhave, “The Invisible Eye?” 605-635. Bhave discovered a correlation between electronic monitoring
systems and the presence of the employer. If employees are under the impression that they are under
surveillance 24/7 through these practices, they are encouraged and motivated to perform at their best in the
workplace. Bhave observed and analysed call quality assessments from a call centre for about three months
with the assistance of a third-party that evaluate the call quality for standardized measures adherent to
company protocols. He found, after analyzing over 4,200 calls from 248 employees, that the performance
ratings were better in those who were frequently monitored. However, it is also mentioned that monitoring
facilitates performance mainly for simple tasks and hinders performance for complex tasks. He also observed,
in addition, that the managers place higher emphasis on quantitative aspects of work lowering the focus on
quality of the work being done. Bhave, “The Invisible Eye?” 605-635. 282 Bhave, “The Invisible Eye?” 629. 283 2009 Electronic Business Communication Policies & Procedures Survey is conducted by The ePolicy
Institute in collaboration with and supported by American Management Association. Among the 586
companies participated in the survey, 24% are with 100 or fewer workers, 22% with 101-500, 10% with 501-
1000, 8% with 1001-2500, 8% with 2501-5000, and 29% with 5001 or more.
http://www.epolicyinstitute.com/2009-electronic-business-communication-policies-procedures-survey-
results [accessed October 25, 2015].
Top contributing factors to and expected benefits of workplace surveillance
➢ In relation to the organization, it is expected to:
• Enhance productivity, improve performance and control quality
• Prevent fraudulent activities and theft of property and equipment
• Ensure responsible use of organization’s assets (risk management tool)
• Guarantee rule abiding employees
• Protect organization’s intellectual property and reputation
• Reduce liability costs and increases financial stability
• Function as a supervisory resource and hence as management process
• Provide a professional environment
➢ In relation to employees, it is expected to:
• Increase employee safety and security
• Support to do the tasks, develop and reach goals
• Give adequate feedbacks and to reward good employees
• Protect from harassment, threats and from loafers
• Ensure fairness in employment
Towards Representational Practices of Surveillance
48
proprietary information and intellectual property of the company by means of external third-party
communication, and an additional 6% engage in transmitting customers’ primary and confidential
data to outsiders. Moreover, 61% of businesses use policy governing the extent of exposure of
company secrets and confidential information; another 41% have policies pertaining to business-
related social networking sites, and 54% regulate personal social networking sites during work
hours.284 Furthermore, and more to the point here, 40% of organizations establish written e-mail
etiquette (netiquette)285 policies and 30% launch guidance for cell phone and language uses in
internal and external communication. The deplorable irony, however, of interest in our discussion
here, is that both intended and unintended fraudulent activities and misbehaviours still continue and
alarmingly grow regardless of prior warnings and precautions. Rules and regulatory measures are
more and more being implemented to govern and control employee behaviour and to retain business
particulars in various situations, especially concerning litigation, productivity, risk alleviation and
security preservation. As described by Johnathan Yerby and S. McEvoy,286 however, one persistent
and, in fact, mounting dilemma in workplace monitoring is that despite employees’ being well
informed about monitoring, many still let their guard down and commit acts that subject them to
disciplinary action. This reminds also the inadequacy of surveillance practices, which again brings
the scope of further research in the discussion of the effectiveness of surveillance practices.
1.5.2 The Clustering of Invisible Consequences
Though many companies and managers believe that surveillance practices alter employee behaviour,
in most cases, as studies show, this objective is not achieved; instead, surveillance practices have
been shown to cause behavioural bondage in the workplaces. These unintended, often undesired
effects are generated and made worse when workplace surveillance is introduced without adequate
justification, consultation and controls. The consistent business need and lack of alternative
approaches in a given situation (e.g., in professions where human lives are at high risk) may probe
to implement reasonable and justifiable monitoring practices. Nevertheless, these practices have
challenged conventional understandings of the relationship between the employer and the
employee287 and between technology and human life by suffusing the workplace with power relations
and the consequences of this new climate. Ken Simpson and Marta Byrski substantiate this impact,
saying that “electronic workplace monitoring is often undertaken for largely positive reasons,
frequently related to productivity enhancement, but tends to result in unforeseen damage to
workplace relationships, [...] and deteriorating organizational culture.”288 Although monitoring,
along with the expectations of employers, does in certain ways benefit employees, as it keeps them
284 With regard to the use of social networks, 60% of business executives surveyed by Deloitte, LLP in 2009,
expressed a belief that they have the right to know their employees’ activities online. However, in contrast to
that, 53% of employees feel “social networking pages are none of an employer’s business.” See “Social
Networking and Reputational Risk in the Workplace,” Deloitte LLP 2009 Ethics & Workplace Survey Results,
2009, http://www.csrwire.com/press_releases/26972-Deloitte-s-2009-Ethics-Workplace-Survey-Examines-
the-Reputation-Risk-Implications-of-Social-Networks [accessed October 30, 2015]. 285 Netiquette is a portmanteau word denoting network etiquette or internet etiquette. It refers roughly to the
informal rules of the internet usage and behaviour adjacent to it, reminding the do’s and don’ts of online
communication. http://www.albion.com/netiquette/ [accessed October 25, 2015]. See also Sally Hambridge,
“Netiquette Guidelines,” Network Working Group, 1995, http://tools.ietf.org/pdf/rfc1855.pdf [accessed
October 25, 2015]. 286 Yerby, “Legal and Ethical Issues of Employee Monitoring,” 44-55; S. McEvoy, “E-mail and Internet
Monitoring and the Workplace: Do Employees have a Right to Privacy?” Communications and the Law 24,
no. 2 (2002): 69-84. 287 Kizza and Ssanyu, “Workplace Surveillance,” 12-14. See also Zweig, “Beyond Privacy and Fairness
Concerns,” 102; Stanton, “Traditional and Electronic Monitoring from an Organizational Justice
Perspective,” 130-134. 288 Simpson and Byrski, “The 21st Century Workplace,” 22.
Towards Representational Practices of Surveillance
49
efficient and focused and discourages unethical or illegal conduct, it becomes problematic when
every word, action, behaviour, communication and movement of employees is tracked and
monitored. Such excessive and unreasonable monitoring and the feeling of total surveillance can,
Ciocchetti explains, (1) “invade an employee’s reasonable expectation of privacy,” (2) “lead
employees to sneak around to conduct personal activities on work time,” (3) “lower morale,” (4)
“cause employees to complain and, potentially, quit,” and (5) “cause employees to fear using
equipment even for benign work purposes.”289 Ciocchetti gives more individualized nature of its
detrimental effects.
Kristen Martin and R. Edward Freeman write that “[i]t is important to note that increased surveillance
of Internet and e-mail usage will only make prosecution of transgressions more difficult – it will not
stop the wrong behaviour. Hence the ‘liability argument’ should not be confused with a non-existent
‘employee security’ argument. Harassment existed before computers and will persist once all
computers are monitored.”290 In addition to this argument, we can point out that surveillance
negatively affects employee feelings about work and about their workplace291 and reduces their
motivation to improve the quantity or quality of the work they are doing.292 Besides, when one is in
a space of continuous surveillance, one is forced to act and even think according to the requisites of
the actual or virtual observer. This encroaches on the personal, intellectual space of the worker (the
all-encompassing term could be ‘privacy’), whereby his or her autonomy, creativity and freedom
shrink drastically.293 Another detailed approach to surveillance in the workplace shows that it “not
only produces measurable outcomes in terms of targets met or service levels delivered, but also
produces particular cultures which regulate performance, behaviours and personal characteristics in
a more subtle way.”294 Moreover, the monitored employees reported “higher workload, less workload
variation and greater workload dissatisfaction than the unmonitored employees [... and] reported less
control over their jobs [...], less fairness of their work standards and more frequent interactions with
difficult customers.”295 More behavioural effects are also foreseen here.
Martin and Freeman claim that actual control over one’s information considerably decreases when
one is subjected to unrestricted surveillance, and this “deprivation of privacy can inhibit maturity and
keep the observed in a childish state due to a loss of privacy and autonomy.”296 Bahaudin G. Mujtaba
stresses this adverse aspect of monitoring very well, claiming that “this surveillance can inject an air
of suspicion and hostility into the workplace and it can be counterproductive as it can cause
resentment in employees at being treated like children, and the culture also can become one of a
mistrust and hostile work environment when employees do not see the justification of monitoring.”297
In connection with the infringement of privacy, surveillance also affects the basis of self-
289 Ciocchetti, “The Eavesdropping Employer,” 285-369, 357. 290 Martin and Freeman, “Some Problems with Employee Monitoring,” 355. 291 Stanton and Weiss, “Electronic Monitoring in Their Own Words,” 425. See also, Watson, N. “The Private
Workplace and the Proposed “Notice of Electronic Monitoring Act”: Is “Notice” Enough?” Federal
Communications Law Journal 54, no. 1 (2001): 79-104; Yerby, “Legal and Ethical Issues of Employee
Monitoring,” 46-47. 292 Peter Danielson, “Ethics of Workplace Surveillance Games,” in Electronic Monitoring in the Workplace:
Controversies and solutions, ed. John Weckert, 19-34 (Hershey: Idea Group Publishing, 2005), 30. 293 Martin and Freeman, “Some Problems with Employee Monitoring,” 354. Cf. Botan and Vorvoreanu, “What
Do Employees Think about Electronic Surveillance at Work?” 128-129. 294 Ball, “Workplace Surveillance: An Overview,” 91. 295 M.J. Smith, P. Carayon, K.J. Sanders, S.Y. Lim, and D. LeGrande, “Employee Stress and Health Complaints
in Jobs with and Without Electronic Performance Monitoring,” Applied Ergonomics 23 (1992): 21. 296 Martin and Freeman, “Some Problems with Employee Monitoring,” 357. 297 Mujtaba, “Ethical Implications of Employee Monitoring,” 37.
Towards Representational Practices of Surveillance
50
determination and self-identity and jeopardises and imperils employees’ mental health.298 Disorders
arise at an alarming rate in such a setting, both psychological (high tension, extreme anxiety, intense
depression, increased boredom, etc.) and physical (musculoskeletal problems, carpal tunnel
syndrome, etc.),299 and this eventually raises stress, diminishes employee job satisfaction,300 and
leads to fatigue and other chronic havoc and turmoil.301 Employees may also be subjected to verbal
bullying, and thus grow more frustrated with their own workplace.302
Still with respect to the privacy issues raised by workplace monitoring, we find that problems related
to ‘data mining’303 and ‘identity theft’304 are on the rise more than ever before. Individual privacy
concerns one of the key issues raised by data mining in an organizational workplace. Employees
have a right to privacy in their personal records. James H. Moor explains that an “individual has
privacy if and only if information related to this individual is protected from intrusion, observation
and surveillance by others.”305 Personal records are disclosed only in certain specific circumstances.
Data mining, however, can yield a very significant amount of information about employees’ habits
and preferences. Identity theft is a growing problem related to data mining. Any transactions
performed by people who have stolen the identities of others will create major problems in the
298 Helen Nissenbaum, “Toward an Approach to Privacy in Public: Challenges of Information Technology,” in
Readings in Cyberethics, eds. R.A. Spinello and H.T. Tavani (Sudbury, MA: Jones and Bartlett, 2001), 392-
403. See also, Richard J. Severson. The Principles of Information Ethics. Abington, OX: Routledge, 1997. 299 Martin and Freeman, “Some Problems with Employee Monitoring,” 355. Cf. Laura Pincus Hartman, “The
Rights and Wrongs of Workplace Snooping,” The Journal of Business Strategy 19, no. 3 (1998): 16-19; G.
Stoney Alder. “Ethical issues in Electronic Performance Monitoring: A Consideration of Deontological and
Teleological Perspectives.” Journal of Business Ethics 17 (1998): 729-743. 300 Yerby, “Legal and Ethical Issues of Employee Monitoring,” 46-47; Aiello, J.R. “Computer-based Work
Monitoring: Electronic Surveillance and its Effects.” Journal of Applied Social Psychology 23 (1993): 499-
507. 301 Stanton, “Traditional and Electronic Monitoring from an Organizational Justice Perspective,” 130. See also,
Kizza and Ssanyu, “Workplace Surveillance,” 12-14. 302 J. Lund, “Electronic Performance Monitoring: A Review of the Research Issues,” Applied Economics 23,
no. 1 (1992): 54. 303 Data mining, known as data or knowledge discovery, is the process of analyzing data from different
perspectives and summarizing it to derive useful information. Through data mining software and tools, the
user analyzes data from many different dimensions and angles and categorizes it, then summarizes the
identified relationships. Thus, data mining technically finds out the correlations or patterns among dozens of
fields in large relational databases. It is primarily used by companies and other organizational workplace
managers and marketing organizations. It enables these companies and other organizations to determine
relationships among "internal" factors (price, product positioning, or staff skills) and "external" factors
(economic indicators, competition, and customer demographics). Subsequently, it enables them to determine
the impact on sales, customer satisfaction, and corporate profits. Problems arise when collected data are used,
with or without the consent of the persons concerned, beyond the context in which they are collected and the
reasons for which they were stored.
http://www.anderson.ucla.edu/faculty/jason.frand/teacher/ technologies/palace/datamining.htm [accessed
December 5, 2014]. 304 Identity theft occurs when a person disguises or pretends someone else’s by assuming their identity in order
to attain some resources or benefits in that person’s name. The victim, whose identity is stolen, has to suffer
the adverse consequences of the actions the other takes in his/her name. This can happen when the other gets
our personal details by mistake or steals our personal information by fraud and uses it without our explicit
permission. This is a serious crime that can destroy our reputation, finances, etc. Identity theft is defined as
“the misuse of another person’s identity, such as name, social security number, driver’s license, credit card
numbers, and bank account numbers. The objective is to take actions permitted to the owner of the identity,
such as withdraw funds, transfer money, charge purchases, and get access to information, or issue documents
and letters under the victim’s identity”. Originally in: Dorothy E. Denning, Information Warfare and Security,
(Boston, MA: Addison-Wesley, 1999). See also, Michael J. Quinn, Ethics for the Information Age (Boston:
Pearson-Addison-Wesley, 2005), 224. 305 James H. Moor, “The Ethics of Privacy Protection,” Library Trends 39, nos. 1 & 2 (1990): 76.
Towards Representational Practices of Surveillance
51
database by giving the false impression that they are the activities of the actual person.306 Adjacent
to this, Cyber-bullying307 is one of the major issues an employee faces in this environment of
monitoring and information tracking. This is defined as “wilful and repeated harm inflicted through
the use of computers, cell phones, and other electronic devices.”308 Employees may be threatened in
multiple ways by cyber-bullying. For instance, in online fights using electronic messages with angry
and vulgar language (flaming), in being made the subject of gossip or rumours meant to damage his
or her reputation or friendships (denigration), in having her secrets or embarrassing information or
images put online (outing), etc.309 These are frequently reported problems in the workplace today.
When all activities and information are electronically monitored, either with or without proper
consent, this poses a grave threat to employees.
In particular, of course, employee privacy is compromised, in especially three respects (1) when there
is invisible information gathering;310 (2) when surveillance technologies exhibit ‘function creep’,
meaning that monitoring technologies may yield more information than is intended or needed in a
particular situation; and (3) when there is unauthorized disclosure of information and/or its
broadcasted to anonymous third parties.311 It also affects employees’ basic desire and aspiration for
respect and trust and often leads them to feel demeaned by the practice,312 as the “responsibility for
making decisions about performance is embedded in the information system.”313 In this regard,
Rebecca M. Chory et al. illustrate that surveillance technology tools can also cause security breaches,
financial loss, trust relation disintegration, employee distraction, and lawsuits.314 The feeling of
distrust of both management and employees leads to increases in absenteeism and turnover315 as
Pfeffer rightly points out, this sense of “pervasive distrust and dissatisfaction manifests itself in
decreasing job tenure, increasing turnover and intentions to quit, and higher levels of voluntary
absence.”316 This decreased trust, coupled with the violation of privacy and fairness concerns,
diminishes organizational commitment per se.317 Employees, as a result of surveillance, experience
different treatment from both management and fellow workers. This may become a sorting tool, since
306 Quinn, Ethics for the Information Age, 222. 307 Cyber-bullying is defined as “the use of information technology to harm or harass the people in a deliberate,
repeated, and hostile manner.” It generally involves sending or posting harmful or cruel text and/or images
using the internet or other digital communication devices, such as cell phones. It may occur on personal
websites or may be transmitted via e-mail, social networking sites, chat rooms, message boards, instant
messaging, or cell phones. Ted Feinberg and Nicole Robey, “Cyber-bullying: Intervention and Prevention
Strategies,” National Association of School Psychologists (NASP),
http://www.nasponline.org/resources/bullying/Cyberbullying.pdf [accessed December 8, 2013]. 308 Sameer Hinduja and Justine Patchin, “Cyber-bullying,” Cyberbullying Research Center, 2010.
http://www.cyberbullying.us/Cyberbullying_Identification_Prevention_Response_Fact_Sheet.pdf [accessed
December 8, 2014]. 309 Del Siegle, “Cyberbullying and Sexting: Technology Abuses of the 21st Century,” Gifted Child Today 33,
no. 2 (2010): 15. 310 Base, A Gift of Fire, 66. 311 Ball, “Workplace Surveillance: An Overview,” 93. 312 Wilborn, “Revisiting the Public/Private Distinction,” 838. 313 B. C. Amick and M. J. Smith, “Stress, Computer-Based Work Monitoring and Measurement Systems: A
Conceptual Overview,” Applied Ergonomics 23, no. 1 (1992): 11. 314 Rebecca M. Chory, Lori E. Vela and Theodore A. Avtgis, “Organizational Surveillance of Computer-
Mediated Workplace Communication: Employee Privacy Concerns and Responses,” Employee
Responsibilities and Rights Journal 28, no. 1 (2016): 23-43. 315 Zweig, “Beyond Privacy and Fairness Concerns,” 105. 316 Jeffrey Pfeffer, “Human Resources from an Organizational Behaviour Perspective: Some Paradoxes
Explained,” The Journal of Economic Perspectives 21, no. 4 (2007): 116. 317 Zweig, “Beyond Privacy and Fairness Concerns,” 113.
Towards Representational Practices of Surveillance
52
it increases differences and reinforces existing inequalities.318 Hence, ruptures emerge in employee
relationships, which diminished employees’ ability to see a promising future and motivated to work
for it. The exhibit-3 highlights the above-mentioned invisible consequences of workplace
surveillance.
Invisible Consequences
➢ In relation to the organization, it:
• allows power to rest in those who monitor and hence loss of employee power
• requires employees’ behaviour modification, often in response to monitoring (chilling
effect)
• gives direct message to employees as wrong doers and to be watched constantly
• creates a false sense of security through control
• involves more control monitoring than the positive reinforcement through rewards
• entails enhanced mechanistic replacement of human supervision
• increases paranoia in the workplace (panoptic surveillance)
• deteriorates pro-employee organizational culture
➢ In relation to employees, it:
• creates feeling of distrust and resentment between employers and employees
• is linked to fewer rewards and more punishment and treats employees as criminals
• invades privacy (loss of identity) and violation of such civil liberties (lack of freedom)
• generates discrimination (hierarchical & among employees) and consequent biased or
unfair treatment
• increases competition and stress and upsurges pressure to high performance & increased
productivity
• creates bigger data breach and misuse of information
• imperils employees’ mental health and raises physical disorders
• leads to fatigue and job dissatisfaction and changes employee behaviour – act at work
and act in personal life.
• limits control of personal data & self-efficacy and thus loss of self-determination
• reduces organizational citizenship behaviour and restricts social exchange practices
(behavioural bondage)
• shrinks autonomy and creativity, which discourages employees and hence increased
turnover
• causes resentment in employees and injects suspicion and hostility into the workplace
Exhibit-3 Invisible Consequeences
1.6 CONCLUSION
To sum up, the five concise sections of this chapter succinctly conceptualize and examine the ways
and means of surveillance in the workplace, as well as their effect on employees. By meticulously
observing and critically analysing the anticipated and actual effects of workplace surveillance, this
part of our study has identified and explored the forgotten issues of workplace surveillance and
argued that the benefits engendered by surveillance practices cannot overrule the individual, social
and ethical concerns of employees heightened by them. There are several ways, discussed above, in
which excessive monitoring can become detrimental to employees, for it invades workers’ privacy,
318 Soraj Hongladarom, “Electronic Surveillance in the Workplace: A Buddhist Perspective,” in Electronic
Monitoring in the Workplace: Controversies and Solutions, ed. John Weckert, 208-225 (Hershey: Idea Group
Publishing, 2005): 213.
Towards Representational Practices of Surveillance
53
disturbs their physical and psychological serenity, erodes their sense of dignity and frustrates their
efforts to do high-quality work by promoting a single-minded emphasis on speed and other purely
quantitative measurements. Besides, the system of differentially rewarding or punishing, basing on
entirely collected data, creates and perpetuates distinctions among employees and fractures the
relationship among employees and between employees and management, thereby increasing social
distance in the workplace. Of all these effects of electronic monitoring in the workplace, two key,
competing employee consequences seem most fundamental and beneficial to investigate: namely
privacy and social distance, along with the challenge the latter poses to employee tranquillity. This
study will thus focus on these especially relevant consequences.
Moreover, a comparative and critical reading of surveys reveal that there is no substantial change or
decrease in the misconduct of employees even after implementing a wide range of monitoring
systems and practices; quite on the contrary, indeed, misbehaviour and fraudulent activities increase.
Identifying and firing employees guilty of misconduct is not, therefore, a tenable and justifiable
solution, and recognizing this opens a new and plausible avenue for the integration of ethical
principles and practices along with moral behavioural and character formation, which we argue for
in the third part of this study. Before this, however, the next chapter focuses on the unique
organizational workplace scenario in India, both socio-culturally and economically, to contextualize
and be more meticulous in our discussion of the problem. Besides being an important venue for
emerging ICT-based knowledge service sectors, including financial accounting, call centres, and
business process outsourcing, India has become a leading centre of global IT headquarters. In this
period of rapid growth of ICT in the Indian organizational workplace, one of the emerging and
persistent questions, within the scope of this study, is ‘how the use of electronic surveillance in Indian
organizational workplaces affects and perhaps endanger employees and give rise to new social
dilemmas in the particular context of its socio-cultural and occupational hierarchy?’ This will be
explored in the next chapter.
CHAPTER TWO
INDIAN PROSPECTS FOR SOCIO-ECONOMIC ADVANCEMENT AND THE PLACE
OF EMPLOYEE SURVEILLANCE
2.0 INTRODUCTION
The organizational workplace in India today is characterized by a reliance on extensive technological
assistance, which has duly prompted debates on the nature, effects and future of these technologies.
Alongside its constructive progression, several internal and external employment problems and
challenges have emerged as India has become a major “recipient of outsourced technology-based
and mediated work mainly from the post-industrial economies,”1 including the alienation of workers
and inadequate infrastructure. The subsequent integration of India into the global economy through
the emergent information technology (IT) and its succeeding service industries also fuel this blaze.
In order to effectively understand the problems of such adaptation and adequately design and manage
the use of technology in India’s globalized-organizational workplace, one must consider the
individual, social and ethical aspects and effects of these practices along with the idiosyncratic
business contexts and culture of India. There is a dearth of research on these topics, however.
Moreover, we know far too little about the nature and structure of the new workforces created in IT
industrial organizations, with their multi-faceted concerns over new work processes and
organizational behaviours. To this end, this chapter analytically and critically examines the human
side of the use of these new forms of electronic surveillance in the Indian organizational workplace.
Our aim will be to meticulously contextualize the discussion undertaken in the previous chapter,
which had a more global scope.
This chapter thus revolves around a question: how do surveillance practices affect the lives and
identities of Indian organizational workers by reconfiguring the nature of work and the ethical canvas
of Indian business culture and society? In the effort to answer this, the first section provides a brief
historical overview of Indian-specific business work culture and management models, along with a
short description of general labour laws and rights in India. The second section offers a more nuanced
contemporary picture of the Indian labour market, highlighting some features of certain work sectors,
employment practices and labour market functions. This is followed, in the third section, by analysis
of labour trends and challenges in globalized IT in India. The fourth section explores Indian legal
frameworks, briefly presents a schematic expression of specific parameters of surveillance and makes
a case for regarding our present time as a new age of challenge for Indian IT workplaces. Employee
concerns related to power-control and power-distance and consequent workplace bullying, discussed
in this section, leads to a detailed analysis of Indian call centres in the fifth and final section.
2.1 WORK-CULTURE AND ECONOMIC SECTORS IN INDIA TODAY
The concept of culture generally encompasses the many and various ways in which people
understand, interpret and relate to one another. It offers a pattern for one’s response to one’s
environment and the world as a whole. Jeremiah J. Sullivan defines culture as “the shared set of
symbols, values, beliefs, and rituals which are used to make sense of the World.”2 By and large, the
1 Carol Upadhya and A. R. Vasavi, “Outposts of the Global Information Economy: Work and Workers in
India’s Outsourcing Industry,” in In an Outpost of the Global Economy: Work and Workers in India’s
Information Technology Industry, eds. Carol Upadhya and A.R. Vasavi, 9-49 (London: Routledge, 2008): 9. 2 Jeremiah J. Sullivan, Exploring International Business Environments (Needham Heights, NJ: Pearson
Custom Publishing, 1999), 335. Edward Burnett Taylor defines culture as “that complex whole which
includes knowledge, belief, art, morals, law, custom and any other capabilities and habits acquired by man as
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
56
term refers to the beliefs, customs, arts, etc., of a particular society, group, place, or time3 that are
valued, at least virtually, by everyone concerned. Thus, it is called the ‘way of life’ of a segment or
group, small or large. Because India is a pluralistic society including different ethnic groups, such as
the Indo-Aryans (72%), Dravidians (25%), Mongoloid and others (3%), it is hard to talk about one
‘Indian culture’ pertaining to the whole nation.4 However, across its entire complex multiplicities,
India is deeply rooted in some form of traditional cultural values just like any other country.
‘Work culture,’ specifically, refers to a “system of personally and collectively accepted meaning of
work, operating for a give group at a given time [...], a system of shared values which results in high
performance [...] and common patterns of feeling and behaviour in an organization.”5 The work
culture in any country thus includes all work-related activities based both on traditional and adapted
socio-cultural and economic factors as well as local norms and preconceptions. Geert Hofstede, in
an effort to identify an Indian ‘work culture,’ states that Indian national culture is ‘collectivist’ and
marked by practices of power distance, masculinity, individualism and an avoidance of uncertainty.6
With its cultural, social, religious and linguistic diversity, India is also famous for being home to
many primitive tribes (with their particular ethos and taboos), a distinctive and ancient civilization,
systemic practices of caste and class,7 and increasingly today for her sophisticated, modern,
industrial, and scientific-technological leadership. In what follows, we analyse the traditional and
organizational work culture in India.
2.1.1 The Traditional and the Current Organizational Work Culture in India
The traditional business work culture in India depends to a large extent on its cultural yardsticks
(ethnic heritage), its people (civilization), its land (geographical features and settlements), its
business environment (traditional trade practices and present foreign investments) and its craving to
adapt to changing science and technology. In other words, regional variations with different
geographical scales and cultural complexities, along with diversity in language, customs and
festivals, and tolerance and acceptance of emerging trends, mark the specifics of Indian work
a member of society” while Hofstede defines it as “the collective programming of the mind which
distinguishes the members of one group from another,” and mark small changes as it is passed from one
generation to the next. See Edward Burnett Tylor, Primitive Culture: Researches into the development of
mythology, Philosophy, Religion, Art, and Custom, originally in 1871 (New York: Gordon Press, 1974), 1;
Geert Hofstede, Culture’s Consequences: International Differences in Work-Related Values (Beverly Hills,
CA: Sage, 1980), 21-23. 3 Merriam-Webster Online Dictionary, http://www.merriam-webster.com/dictionary/culture [accessed
February 5, 2016]. 4 Dayanand Arora, “Foreign Multinationals in India: Adopting to India’s Work Culture and Management
Practices,” in Internationale Geschäftstätigkeiten in Asien: Länderkulturforschung anhand ausgewählter
Länder, eds. Wilhelm Schmeisser, Thomas R. Hummel, Gerfried Hannemann, and Dirk Ciupka (München:
Rainer Hampp Verlag, 2005), 162-165. 5 Kavita Singh, “Work Values and Work Culture in Indian Organizations: Evidence from Automobile
Industry,” Delhi Business Review 2, no. 2 (2001), http://www.delhibusinessreview.org/v_2n2/dbrv2n2d.pdf
[accessed on February 5, 2016]. 6 Geert Hofstede, Culture’s Consequence: International Differences in Work-Related Values, vol. 5 (Newbury
Park: Sage, 1980), 65-210. Geert H. Hofstede conducted two surveys (1968 & 1972) as part of his study of
cultural impact on social behaviour. In his study Hofstede identified and explained four factors that make the
cultural differences of both the developed and developing countries: collectivism-individualism, power
distance, masculinity-feminity, and uncertainty avoidance. 7 The caste system which was initially devised “on the basis of division of labour and functions [...] degenerated
later into a rigid system” that had many further socio-economic and political implications and impacts.
Mohamed, The Foundations of the Composite Culture in India, 19.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
57
culture.8 It is said to be the reflection of various norms and standards of its people. It is more
hierarchical in leadership structure, more hardworking in customary nature, more task-based than
clock-based in working hours, and more resistive in implementing changes in the work patterns.9 In
the same way, cultural stereotypes can be useful to a business work culture as it tries to improve
productivity and expand services globally by determining definite and explicit standards of
individual performance.10 This shows that India, as a country invested in adhering to traditional
values and beliefs, often stifles its workforce culture at the very moment it is longing to embrace
what is new.
For instance, the caste system as a socio-cultural practice has much affected the Indian approach to
work and life. According to this structure, “Brahmins (priests and teachers) were the apex, Kshatriya
(rulers and warriors), Vaishya (merchants and managers) and Shwdra (artisans and workers)
occupied the lower levels, [and] those outside the caste hierarchy were called ‘untouchables.’”11 This
socio-cultural categorization determined even the hierarchy of social status. The link between this
hierarchy and workplace behaviour will be addressed later in this research. To elaborate the
discussion further and set in relief another characteristic of the Indian cultural practice, we may point
to the process of socialization as a form of passing culture and feature of growing Indian work culture
that promotes a ‘collectivist mind-set.’12 While being open and flexible in adapting to collective
norms, people are often passive in proposing creative ideas and thus promote a kind of ‘dependency
proneness’ in all their behaviours.13 A similar pattern is followed in the workplace, where workers
often voluntarily act as the passive receptors of commands issued by others and create a work culture
where each derives his or her security from a dominant other.
In the same way, there is a ‘hierarchy orientation’ in Indian traditional work culture, which continues
to this day in many internal circles and private spheres of work.14 Those at the top of the hierarchy
hold the power and enact it over their inferiors. Nevertheless, this power gradation also shows aspects
of respect, loyalty, affection, and bonding, which are more clearly cultural tendencies and more
directly linked to a particular management style. We will further analyse and elaborate this in the
next section. This hierarchical orientation is similarly rooted, along with an attitude of dependency,
in the caste-based thinking prevalent in various forms in almost all parts of India, though today often
less in urban areas. Likewise, nepotism is common in work culture, as family, cast, locality, language
and other such factors have their effect on job attainment. There is a widespread disparity of
outcomes among workers based on family background and geography. For example, according to
Hofstede, Roli Nigam and Zhan Su maintain that family interests and the continuity of business are
highly important for Indian business culture, as opposed to the custom in many Western countries.15
8 Soniya Jhunjhunwala, “Review of Indian Work Culture and Challenges Faced by Indians in the Era of
Globalization,” Interscience Management Review 2, no. 2 (2012): 67. 9 Jhunjhunwala, “Review of Indian Work Culture and Challenges Faced by Indians in the Era of Globalization,”
69. 10 Pam D. Stokes examines culture in line with the national and international corporate environments. Pam D.
Stokes, “The Corporate and Workforce Culture of India,” 2003,
http://www.sixsmart.com/SSPapers/psw10.htm [accessed February 8, 2016]. 11 Samir R. Chatterjee, “Human Resource Management in India: ‘Where From’ and ‘Where To’?” Research
and Practice in Human Resource Management 15, no. 2 (2007); 92-93. 12 Arora, “Foreign Multinationals in India,” 163. 13 Arora, “Foreign Multinationals in India,” 163-164. 14 Arora, “Foreign Multinationals in India,” 163-164 15 Roli Nigam and Zhan Su, “Management in Emerging versus Developed Countries: A Comparative Study
from an Indian Perspective,” Journal of CENTRUM Cathedra 4, no. 1 (2011): 124; Geert Hofstede, Culture’s
Consequence: International Differences in Work-Related Values, vol. 5 (Newbury Park: Sage, 1980), 13-252.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
58
Religion also plays a crucial role in the formation of work culture. For religion, beyond being a matter
of mere belief, also involves institutionalized patterns of behaviour such as rituals, ceremonies, art,
and other such practices.16 Religious sentiments concerning what will be an auspicious or
inauspicious day to begin or alter work, for instance, provide an understanding of religious influences
in the work culture. Over 80% of the Indian population follows Hinduism and its cultural legacy,
including its ideology of reincarnation (rebirth), its ‘law of karma’ (expectation of the fruits of
human action), and its goal of Moksha (Liberation). In view of this, people tend to be more fatalistic
and less deterministic in their work and life and thus accord less importance to material wealth and
possessions.17 In the same way, as opposed to the Western practice of prioritizing performance-based
career opportunities and payments, Indian culture promotes relationships and values the loyalty of
employees and their years of experience in assigning promotions. It also shows more flexibility in
enforcing rules and regulations in cases where personal relationships exist.18 All this appears against
the background of the ‘cosmic vision’ of Indian religious and cultural values, which holds that “the
quality of man is judged by the quality of his mind and spirit, the quality and depth of his perceptions,
not by the quantity of his possessions.”19 The intrinsic worth of every individual is valued and given
utmost importance.
Labourers’ personal relationships with one another are the hallmark of traditional Indian work
culture. It is the labour class in India, constituting a major portion of the society, that contributes
most to its socio-economic life and development, as is the case in many developing countries. In this
context, this cultural milieu in fact conversely affects workplace behaviour, and one must consider
the disparities in wage and reward. A majority of jobs in the informal sector are underpaid or low-
paying opportunities, which increases inequalities in income and wealth. People belonging to certain
socio-religious groups or those from disadvantaged regions suffer more from this segregating
situation.20 However, a new middle class (the labouring class) emerged in the 1990s and played a
leading role in modernizing India while influencing socio-economic and political developments.21 A
middle class social order in work culture has been developing from the time of British rule in India,
and in post-independent India, “the power and constitution of the middle class was based not on the
economic power it wielded, which was minimal, but on the ability of its members to be cultural
entrepreneurs.”22 To understand and adapt to this transformation, one needs to analyse and
contextualize the nature and present status of organizational work culture in India, as we aim to do
below.
16 Mohamed, The Foundations of the Composite Culture in India, 33. It is something like the fusion of religion
and culture we see in Islamic states or like the role of Zen Buddhism in Japanese culture and like Christian
communities in the West. According to the data of India Census 2011 released in 2015 by Government of
India: Hinduism 79.80%; Islam 14.23%; Christianity 2.30%; Sikhism 1.72%; Buddhism 0.70%; Jainism
0.37%; and other religions / no religion 0.9%. Ministry of Home Affairs, Government of India, “India Census
2011,” http://www.censusindia.gov.in/2011census/c-01.html [accessed February 5, 2016]. See also Sagnik
Chowdhury, Abantika Gosh and Ruhi Tewari, “Census 2011: Hindus Dip to Below 80 per cent of Population;
Muslim Share Up, Slows Down,” The Indian Express, August 27, 2015,
http://indianexpress.com/article/india/india-others/indias-population-121-09-crores-hindus-79-8-pc-
muslims-14-2-pc-census/ [accessed February 5, 2016]. 17 Arora, “Foreign Multinationals in India,” 165; Nigam and Su, “Management in Emerging versus Developed
Countries,” 124. 18 Nigam and Su, “Management in Emerging versus Developed Countries,” 124. 19 Mohamed, The Foundations of the Composite Culture in India, 30. 20 Institute for Human Development, India Labour and Employment Report 2014: Workers in the Era of
Globalization (New Delhi: AF and IHD, 2014), 75. 21 Arora, “Foreign Multinationals in India,” 166. 22 Arora, “Foreign Multinationals in India,” 166. Originally in, Sanjay Joshi, Fracture Modernity: Making of
a Middle Class in Colonial North India (New Delhi: Oxford University Press, 2001), 2.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
59
Since ancient times, India has been known as an industrial exporter. Archaeological evidence as well
as other records, inscriptions and writings enable us to trace the history of human occupations of the
Indian subcontinent back ten thousand years and calculate gross domestic product figures since the
start of the Common Era.23 The ruins of the great Indus Valley civilization gives indisputable
evidence of well-developed trade and business in India even in 2500 B.C., which has been, since
then, playing a significant role in the socio-cultural, political and economic history and development
of the country, and vice versa.24 The trade history of India reveals that even in Phoenician times,
spices, ivory, silks, fine cotton and precious stones were carried by Indian merchants to Egypt and
the countries of Asia Minor. Both internal and external trades were at a peak.25 Ancient India had
different forms of business, such as the family-run business, individually owned business enterprise
and other forms of collective activity, among which the most common was the ‘Sreni’, something
similar to the modern corporate form of organization with codes of conduct and general rules
regulating business.26
The construction of commercial cities like Harappa and Mohenjedaro in the fourth and third centuries
BCE proves the same.27 Even though India was an industrial country thousands of years ago, there
was an interruption, as Sumit Kumar Majumdar opines, and only in the last 150 years has India
resumed her way on the path of industrialization.28 The Indian economy at the time of independence
had been dramatically drained, and as Uma Kapila writes, the “Indian economy was overwhelmingly
rural and agricultural in character with nearly 85 per cent of population living in villages and deriving
their livelihood from agricultural and related pursuits using traditional, low productivity
techniques.”29 Besides, the industrial sector was underdeveloped due to the policy of exploitation
and destruction of the British Raj, its weak infrastructure, and other factors.30 However, India, even
at the time of the English East India Company, played a leading role in trade, exporting spices and
other luxury items from India to Europe.31
It is also interesting to observe that in the 1920s, after the First World War, still a time of colonialism
in India, an extensive and affirmative burst of Indian entrepreneurship started in eastern India. The
consequent effective competition by these Indian enterprises challenged, weakened (in 1930s) and
eventually destroyed (in 1945) the British hold on industry in India.32 It also raised awareness about
the importance of the Swadeshi (native) economic ideology, after which Indian industries and
business interests were growing steadily. This Indian industrial sector, after independence, divided
into a public sector and a private sector and a substantial expansion was made in both.33 Nevertheless,
23 P. Kanagasabapathi, Indian Models of Economy, Business and Management, 2nd ed. (New Delhi: PHI
Learning, 2009), 6. 24 Abhoy K. Ojha, “Innovation and Entrepreneurship in the Indian IT Industry: Contextual Impediments,” in
Corporate Governance and Stewardship: Emerging Role and Responsibilities of Corporate Boards and
Directors, ed. N. Balasubramanian (New Delhi: Tata McGraw Hill Education, 2010), 89. 25 Kanagasabapathi, Indian Models of Economy, Business and Management, 14-15. 26 Sreni is a legal entity composed of a collection of people who were normally engaged in a similar trade.
Kanagasabapathi, Indian Models of Economy, Business and Management, 25. 27 Kanagasabapathi, Indian Models of Economy, Business and Management, 161. See also, P.N. Agarwala, A
Comprehensive History of Business in India – From 3000 BC to 2000 AD (New Delhi: Tata McGraw-Hill,
2001), 265. 28 Sumit Kumar Majumdar, India’s Late, Late Industrial Revolution (Cambridge: Cambridge University Press,
2012), 67. 29 Uma Kapila, ed., Indian Economy since Independence, 14th ed. (New Delhi: Academic Foundation, 2002-
03), 26. 30 Kapila, Indian Economy since Independence, 63. 31 Kanagasabapathi, Indian Models of Economy, Business and Management, 164. 32 Majumdar, India’s Late, Late Industrial Revolution, 117. 33 Kanagasabapathi, Indian Models of Economy, Business and Management, 167.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
60
industrial policy in post-independence India from 1947 to 1991 and the political economy of
industrial development presented major challenges. For at this time, certain industries like ordinance,
public utilities, and railways were nationalized and some others were established as state-owned, and
still others sought private investment.34 With its recently flourishing local industries and businesses,
the Indian economy started growing after independence as the government stepped up investments
with its own policy making.
The second half of the twentieth century witnessed a number of subtle changes, ranging from socio-
cultural upgrading, political integrations, and economic growth. Majumdar rightly observes:
The changes in the outlook of the governments since the mid 1980s, and the liberalization process
initiated since the beginning of the 1990s, heralded new developments in the industrial and
business scenario of the country. [...] Business was becoming global and many business centres
were gaining attention at the international level. [...] The new era witnessed the entry of an
increasing number of foreign business interests in different sectors.35
Contemporary Indian industrial and business development shows that India has moved from being
an agricultural country to a service producing country. In view of this, the Indian work culture seems
dualistic, as a large traditional economy (i.e., agriculture) coexists alongside an economy of industry
and services that produce a high level of growth and productivity. As a result, there is in India, the
advancement and growth of Multinational Companies (MNCs), Information Technology (IT) &
Information Technology Enabled Service (ITES) sectors, Business Processing Outsourcing (BPO)
& Knowledge Processing Outsourcing (KPO) and other globalized tendencies of business and work
practices. A substantial amount of attention is given today to the service sector in India, through the
performance of IT and the related software, outsourcing, and back office services.36 This experience
of radical change in the structure, policies and work pattern in India has also led to a paradigm shift
in Indian work culture, understood as an expression of the norms and standards of the Indian people.
The organizational work culture in India now differs in important ways from the traditional structure,
as uniquely Indian labour characteristics adapt to the new economic and procedural structures of the
globalizing world. Organizational work culture, in general, is the sum of long lasting and largely
accepted ideologies (values, beliefs, objectives, policies) and practices (rules, regulations, norms,
traditions, rituals) in any organization. It is formed as a consequence of “values and beliefs carried
forward from long time and has substantial impact in the behaviour, quality, and quantity of work
done by the employee in an organization.”37 In other words, the common atmosphere in the
organization and the prevailing or expected relational framework among the employees determine
the specific work culture in any organization.
This work culture is marked by the fair and transparent use of equal opportunities for employees, a
refusal of damaging disparities or thoughts of incapacity, and increased trust in the organization. All
this certainly contributes to the cordial organizational climate and work culture.38 This specific
34 Majumdar, India’s Late, Late Industrial Revolution, 158. 35 Majumdar, India’s Late, Late Industrial Revolution, 167. 36 Majumdar, India’s Late, Late Industrial Revolution, 218-220. 37 Jhunjhunwala, “Review of Indian Work Culture and Challenges Faced by Indians in the Era of
Globalization,” 67. See also Samta Jain, Namrata Mehta, and Varun Bagai, “A Study of Organizational
Climate and Culture in an Indian Nationalized Bank Using and Octapace Survey,” aWEshkar: A Peer
Reviewed Research Journal 18, no. 2 (2014): 52-53. 38 Naveen Kumar Bandari and N. Uday Kumar, “Key Imperatives of Talent Management: The Indian IT and
ITES Industry Perspective,” in Managing Human Resoruce in Global Era – Prspects & Challenges, ed. Ravi
Aluvala (Hyderabad: Zenon Academic Publishing, 2014), 115.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
61
pattern of behaviour and practices is important for generating a unique corporate identity, which has
“a strong bearing on the character and persona of an organization.”39 The culture we speak of here is
always people-oriented and promotes a team spirit to enhance its function, sustenance and success.
Sadly, however, this work culture is often inhibited and prevented, since the factors of power distance
and uncertainty avoidance that are so characteristic of Indian culture prompt top-level directors,
executors, and managers to be more authoritative and lower-level workers to be more dependent on
them.40
The nature of high power distance in Indian work culture enforces employees not to welcome
empowerment of any type in the organizational workplace. This passivity is also heightened due to
the ‘dependency proneness’ noted above. Hence, it is interesting to observe that power is an
important part of the cultural milieu that continues to be a strong motivational factor in the Indian
organizational workplace. The reasoning of modern achievement theory that links the level of
achievement with the strength of the power motive in fact supports these same ideologies.41 Likewise,
collectivistic attitudes and tendencies “emphasise co-operation, endurance, persistence and
obedience [and] tend to have long-term orientation, leading to long-term commitment to the
organization.”42 In the same way, the collectivist nature of Indian work culture practices and
promotes a philosophy of equality in matters of employment compensation, in contrast to the equity
philosophy of more individualistic societies.43
There is also a change in the work culture of Indian organizations due to the industrialization of
Information Technology and consequent new style of manufacturing. This has been defining of
India’s contemporary evolution in business and commerce. It has provided more internal
employment, created added revenue, gained additional export earning, and increased competition by
intensifying external investment in the sector. For instance, Madhu Ranjan Kumar and Shankar
Sankaran observe that within the context of new organizations, there is a decrease in the preference
for both power distance and collectivistic orientation, and an aspiration to embrace global work
values.44 In this context, Jai B.P. Sinha identifies three phases of evolving organizational culture in
India: first, making a pure replication of Western theories and concepts; second, a kind of total
disenchantment with them; and third, an integration of Western and Indian contents and processes of
organizational behaviour.45 This type of adaptation or integration brings a gradual but steady change
in the organizational work culture and behaviour. The rapid advancement and strong adaptation of
IT work patterns in India as it stands now has several effects: it contributes to the availability of all
kinds of information worldwide on all conceivable topics, it increases the communication and
39 Jain, Mehta and Bagai, “A Study of Organizational Climate and Culture in an Indian Nationalized Bank
Using and Octapace Survey,” 52. 40 Nigam and Su, “Management in Emerging versus Developed Countries,” 124. 41 Nigam and Su, “Management in Emerging versus Developed Countries,” 126. Achievement motivation
theory developed by David McClelland in 1961 explains individual behaviour and any performance based on
his or her need (intrinsic and learned) for achievement, power, and affiliation. See Lori L. Moore, Dustin K.
Grabsch, and Craig Rotter, “Using Achievement Motivation Theory to Explain Student Participation in a
Residential Leadership Learning Community,” Journal of Leadership Education 9, no. 2 (2010): 25. David
McClelland in his work “The achieving society” identifies three motivators – need for achievement, need for
affiliation, and need for power – that all people possess, and by depending on the dominant motivator among
these, people also show different characteristics in their work and life. He also observes that the dominant
motivator in a person is largely culture and life experience dependent. David C. McClelland, The Achieving
Society (New York: Free Press Paperback Edition, 2010, originally in 1961), 36-62. 42 Madhu Ranjan Kumar and Shankar Sankaran, “Indian Culture and the Culture for TQM: A Comparison,”
The TQM Magazine 19, no. 2 (2007): 178. 43 Nigam and Su, “Management in Emerging versus Developed Countries,” 127. 44 Kumar and Sankaran, “Indian Culture and the Culture for TQM: A Comparison,” 179. 45 Jai B.P. Sinha, Culture and Organizational Behaviour (New Delhi: Sage Publications, 2008), 15.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
62
connectivity with anyone-anytime-anywhere, and it enables one to work even with only a virtual
presence, and thus revolutionizes the individual and organizational work culture.46
Next to this IT revolution in business and work culture, a consequent structural change in the nature
of organizations has facilitated the emergence of more transnational organizations. These
transnational or multinational organizations, according to Sinha, “instead of being totally embedded
in a particular culture and obliged to serve the interests of a single nation, [...] reflect many cultural
shades, tend to satisfy many stake-holders, and respond to highly complex and turbulent international
market.”47 There is great longing for this structural change due to the high competition within and
among the organizations to match with the multinational standard (both commercial and market
driven) and to meet the emerging and changing demands of national and international clients and
customers.48 Finally, as any organizational culture is formed by the shared values of people and
“transmitted among employees through behavioural expectations and normative beliefs [...], shared
values and norms focus employees’ attention on organizational priorities and guide their behaviour
and decision making.”49 Also interesting is that corporate leadership looks for effective managerial
strategies based on these cultural phenomena. Both traditional and new management models in India,
as well as more global management practices, will be explored in the final part of his research.
At this juncture, staying within the scope of our research and keeping in mind all the features of the
Indian socio-cultural and economic framework mentioned above, we shall turn our attention to the
electronic surveillance or employee monitoring in the workplace as managerial workplace behaviour
and critically delve into its possible and actual impacts on employees. For the new organizational
environment is not the same as a conventional, fixed set of behavior. Rather it is a complex, dynamic
web where people interact with one another for effective work performance. Before entering into
this, let us examine some key features of Indian labour laws and rights pertaining to both the
employer and the employee.
2.1.2 Indian Labour Laws and Rights
Given that labour is a significant component in the economic and social development of any country,
a well-protected policy of regulation should be put in place to ensure its welfare and growth. India
has always had a protected and growing economy with many labour welfare norms and rules,
consisting both of legislation and other industrial policies and acts. The Constitution of India, in
article 21, guarantees the ‘right to life’ of every citizen, which is the most fundamental of all rights.50
Along with the protection of life and personal liberty, this article assures the right to livelihood,
which is inherent in it, and to live with human dignity, freed from exploitation and intrusion of any
kind, to every citizen, providing in this way a kind of innate social security. Article 39 of the Indian
Constitution states certain principles of policy to be followed by the State, to the effect that the state
shall secure for its citizens, men and women equally, (a) the right to an adequate means of livelihood;
(b) equal distribution of ownership and control of material resources; (c) equal pay for equal work;
and (d) no abuse of the health or strength of workers and surety of not being forced to enter avocations
46 Sinha, Culture and Organizational Behaviour, 20. 47 Sinha, Culture and Organizational Behaviour, 21. 48 Sweety Pohankar, “Research Article on Organizational Culture as a Driving Tool for Developing and
Improving Managerial Effectiveness,” Research Journal of Management Sciences 4, no. 11 (2015): 11. 49 Sanjeev K. Sharma and Aditi Sharma, “Examining the Relationship between Organizational Culture and
Leadership Styles,” Journal of the Indian Academy of Applied Psychology 36, no. 1 (2010): 98. 50 It is well explained in the first chapter (1.1.4) with reference.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
63
unsuited to one’s age and strength.51 In the same way, the constitution also calls upon the state to
secure the right to work, within the state’s economic capacity and development (article 41), to ensure
that this work is done in just and humane conditions (article 42), that an appropriate and rightful
living wage be paid to all workers - agricultural, industrial, or otherwise – and that conditions of
work ensure a decent standard of life and full enjoyment of leisure and social and cultural
opportunities (article 43).52 Thus, it ensures a decent standard of life for every citizen in India.
In addition to establishing and honouring these labour rights, the Government of India has also
enacted additional labour laws to protect and secure the rights of the labour class. Some legislation
in India is from the time of British rule, such as: (1) the Workmen’s Compensation Act of 1923 that
assures the payment of compensation on various occasions; (2) the Trade Unions Act of 1926 that
provides for registration of trade unions (TUs), protects registered TUs and members with collective
procedures; and (3) the Payment of Wages Act of 1936 that ensures the right and equal distribution
of payments and wages. Other later piece of legislation also plays a role: The Industrial Disputes Act
of 1947; the Minimum Wages Act of 1948; the Maternity Benefit Act of 1961; the Contract Labour
(Regulation and Abolition) Act of 1970; the Bonded Labour System (Abolition) Act of 1976; and
the Equal Remuneration Act of 1976. These pieces of legislation, along with several others enacted
in line with International Labour Organization (ILO) recommendations, cover everal key areas: (a)
compensation, equal pay, minimum wages; (b) freedom of association, freedom from exploitation;
and (c) labour welfare systems such as maternity benefits, employee insurance, old age benefits,
retiral/retirement benefits, redundancy and termination benefits, and accident/injury benefits.
These regulations were largely designed to secure labour supply and control, to eradicate subhuman
working conditions in factories, and to improve standards of life for every labourer.53 The ILO began
to influence Indian labour policy after the 1920s, and India progressively responded to the ratification
of various ILO conventions.54 In the same way, the post-independence central government of India
was responsible to promote legislation favourable to labour and deal with all phases of worker’s life,
with particular commitment to socio-economic values and justice and with a democratic-egalitarian
conception and praxis of national development.55 These, along with other industrial laws, continue
to form the body of Indian labour law that on the one hand respects the relation between employer
and employee and on the other affirms job security and employment protection.56 However, in the
post-1990s, adaptation to economic globalization and liberalization led to an alteration of Indian
labour laws in accordance with global trends.
51 Legislative Department, “The Constitution of India,” Ministry of Law and Justice, Government of India, as
on November 9, 2015, 21-22. See, http://lawmin.nic.in/olwing/coi/coi-english/coi-4March2016.pdf [accessed
February 2, 2016]. 52 Legislative Department, “The Constitution of India,” 22-23. 53 Richard Mitchell, Petra Mahy and Peter Gahan, “The Evolution of Labour Law in India: An Overview and
Commentary on Regulatory Objectives and Development,” Asian Journal of Law and Society 1 (2014): 415. 54 Mitchell, Mahy and Gahan, “The Evolution of Labour Law in India,” 416. 55 Mitchell, Mahy and Gahan, “The Evolution of Labour Law in India,” 421. 56 Mitchell, Mahy and Gahan, “The Evolution of Labour Law in India,” 423. Examples for other particular
legislations are: Dock Workers (Regulation of Employment) Act 1948; Employees’ State Insurance Act 1948;
Plantations Labour Act 1951; Mines Act 1952; Employees’ Provident Fund and Miscellaneous Provisions
Act 1952; Contract Labour (Regulation and Abolition) Act 1970 (amended in 1986 and 2005); Maharashtra
Recognition of Unions and Prevention of Unfair Labour Practices Act 1971; Bonded Labour System
(Abolition) Act 1976; Interstate migrant Workmen (Regulation of Employment and Conditions of Service)
Act 1979; Industrial Disputes (Amendment) Act 1982; Child Labour (Prohibition and Regulation) Act 1986;
Building & Other Construction Workers (Regulation of Employment and Conditions of Service) Act 1996;
and Private Security Agencies (Regulation) Act 2005.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
64
This reform of the Indian labour market was grounded in an urge for economic stability and growth
after the monetary and fiscal crisis of the late 1980s. Thus the new labour policies were introduced.
However, some proposals and Bills initiated and effected by the central government and enforced by
the state government, in both the organized and unorganized sectors, were criticized by many labour
analysts. For these neoliberal reformed measures, they argued, “weaken union power, [...]
individualize labour relations, privatize public enterprises, dilute labour laws [with] freedom to hire
and fire and close undertakings, [...].”57 Similarly, more flexible ‘hire and fire’ laws in the Special
Economic Zones (SEZ) created by some state governments to attract the foreign business
investments, have been severely criticized.58 Liberalization, in fact, paved the way for a drastic
relaxation in labour laws with regard to contract labours, the flexibility of employment and thus
crucial labour challenges as well. The cluster of present Indian labour laws, which still has an ILO
standard and influence, is relatively progressive and has “immediate and fundamental implications
for the social and economic stability and progress, and [...] inevitably exist in relations between
capital and labour, and in the regulations of labour markets.”59
The above descriptions of the labour laws generally point out the broad parameters of government
and legislative policies and regulations. The main reasons for the passage of these labour laws are
“power imbalances between labour and capital, the need for ensuring social justice, and to promote
rather conducive industrial relations to ensure uninterrupted industrial production.”60 These are the
body of administrative rulings or precedents that address the legal rights, restrictions, and duties of
working people by meeting both worker demands for better working conditions and employer
demands for efficient management. Indian liberal labour policy attracts both domestic public/private
investments and foreign direct investments and creates new job opportunities, thus promoting the
emergence of new employment trends in India with MNCs and the IT & ITES service sectors. Most
of these sectors and services function under the rule of ‘corporate governance’ and encourage global
capital financing, investments and economic progress.61 In a latr section, we will discuss more
specific rules and acts governing the Indian IT service sectors and electronic surveillance and data
protection in the workplace, within the scope of our research, paying attention to elements such as
the quality, practice, purpose and impact of these laws and policies on employees. In the following,
we note several features of India’s economic sectors by analysing differences between traditional
and modern Indian labour systems and identifying some characteristics of work sectors, employment
practices and labour market functions.
2.1.3 IT Industry and Services: The Alteration of Indian Economic Sectors
We present in this section the Indian economic sectors and activities, which are broadly categorized
into a primary sector, a secondary sector, and a tertiary sector.62 The economic activities of the
57 Mitchell, Mahy and Gahan, “The Evolution of Labour Law in India,” 426. 58 Mitchell, Mahy and Gahan, “The Evolution of Labour Law in India,” 427-428. Special Economic Zones
(SEZ) were created by the central government of India as part of its Export-Import Policy 1997-2002. 59 Mitchell, Mahy and Gahan, “The Evolution of Labour Law in India,” 429-430. 60 Institute for Human Development, India Labour and Employment Report 2014, 117. 61 Jairus Banaji, “India: Workers’ Rights in a New Economic Order,” Workers’ Rights and Labour Laws, A
Backgrounder for the Workshop on Labour to be held from 29-31 December 2000 at the National Conference
on Human Rights, Social Movements, Globalization and the Law (Mumbai: India Centre for Human Rights,
2000), 2. The formal expression of the rules of corporate governance is called ‘codes of corporate governance’
and rapidly spread in late 1990s. 62 The division of the Indian economy as primary, secondary and tertiary sectors is based on the nature of the
activities performed. At the same time, based on ownership it is divided into private sector and public sector
and on the basis of the condition of workers, organized and unorganized sectors. These will be elaborated
later in the following sections.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
65
primary sector, also called the ‘agricultural sector,’ concern the direct use of natural resources and
comprises agriculture, forestry, fishing, fuels, metals, minerals, etc. The secondary sector, also called
the manufacturing sector or ‘industrial sector’ (automobiles, textiles), uses the produce of the primary
sector as raw materials and engages in further invention, fabrication, and creation. The tertiary sector
is known as the service sector and produces or generates different services, such as education,
banking, insurance, etc., and contributes to the development of the primary and secondary sectors.63
The Indian economy, which has been primarily an agrarian economy until independence with its
more domestic orientation, now revolves around the industrial and service sectors.64 Exhibit 1
below,65 shows the economic growth from the early 1980s and is self-explanatory in this regard.
Exhibit 1 – Percentage of GDP
When the primary sector possesses a share of 50 percent or more of the total output (GDP) of the
economy of the country, it is an agrarian economy. The same principle applies to the secondary sector
(the industrial economy) and the tertiary sector (the service economy). Almost 60 percent of the
Indian population at the time of independence depended on the primary sector for its livelihood,
which gradually and consistently decreased with increased industrialization and new emphasis on
post-industrial societies or services societies.66
The share of the service industry in GDP grew gradually but steadily in these decades and contributed
to the process of India developing into a service economy.67 For although the Indian economy
63 Ramesh Singh, Indian Economy: For Civil Services Examinations, 7th ed. (New Delhi: McGraw Hill
Education, 2015), 1.13. 64 Singh, Indian Economy: For Civil Services Examinations, 1.14. 65 Singh, Indian Economy: For Civil Services Examinations, 1.22. See also the reference links here below for
a detailed analysis and clarification of the data given in the graph. Research & Publication Unit, “India in
Figures 2015,” Central Statistics Office, Ministry of Statistics and Programme Implementation, Government
of India, New Delhi, 2015, 1-25; http://statisticstimes.com/economy/sectorwise-gdp-contribution-of-
india.php [accessed January 25, 2016]; Planning Commission, Government of India, updated in 08 July 2015.
http://planningcommission.gov.in/data/datatable/data_2312/DatabookDec2014%202.pdf [accessed January
25, 2016]; Jayan Jose Thomas, “Explaining the ‘Jobless’ Growth in Indian Manufacturing,” Journal of the
Asia Pacific Economy 18, no. 4 (2013): 673-692. 66 Singh, Indian Economy: For Civil Services Examinations, 1.14. 67 The contributors of Indian service (tertiary) sector are: trade, transport (rail and other means),
communication, banking & insurance, hotels & restaurant, public administration & defence, legal services,
0%
20%
40%
60%
80%
100%
1983 1993-94 2004-2005 2014-2015
4030
20.2 14.1
24.3
25.226.1
18.4
35.748.8 53.7
67.5 Service
Industry
Agriculture
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
66
underwent a structural change in production, shifting from agriculture towards industry and service,
the diversification of GDP occurred mostly with the shift not from agriculture to industry but from
agriculture to services.68 For instance, the share of agriculture or the primary sector in real GDP
declined from 40 percent in 1983 to 20.2 percent in 2005, whereas the share of industry and services
increased from 24.3 percent to 26.1 percent and 35.7 percent to 53.7 percent respectively in the same
period. The margin of industrial growth is minimal compared to that of the service sector. Moreover,
the agriculture sector drastically declined during the period 2005-2015, from 20.2 per cent in 2005
to 14.1 per cent in 2015, along with a gradual decline in the industrial sector from 26.1 per cent in
2005 to 18.4 per cent in 2015. However, the service sector output increased by 13.8 per cent during
these periods, from 53.7 per cent in 2005 to 67.5 per cent in 2015. This shows that in India, the
service sector has emerged as the major sector of the economy both in terms of growth and share of
GDP.
In addition to the agricultural and manufacturing sectors, India today primarily invests in trade,
education, entrepreneurship, technology, modern means of communication and transportation, and
social development. The considerable increment in foreign investment and consequent incredible
growth of Indian IT services makes the service sector the largest contributor to the GDP of globalized
India.69 Likewise, with its positive investment climate, India has become the world’s most attractive
IT market hub, with excellence in digital skills and business delivery. It mainly “comprises of
instance System Integration, Software experiments, Custom Application Development and
Maintenance (CADM), network services and IT Solutions.”70 An extensive leapfrogging has allowed
India and any developing countries to bypass the various stages and generations of technological
growth and situate itself directly in a service-dominated economy.71 In this way, in India, information
technology services have become high productivity services and make for a different workplace
system and work culture. These salient factors we examine in the following segment.
The IT industry and Information Technology Enabled Services (ITES) sprouted and developed in
India with the help of foreign investments from IBM and ICL and prospered tremendously after the
successful issuance and reception of liberalization policies in the 1990s and many more investments
thereafter.72 The IT sector generally refers to the digital processing, storage and communication of
information of all kinds.73 As part of an inclusive and large-scale transformation belonging to global
services of the 21st century, the IT boom hit the shores of India with tags such as “Served from India”
real estate, personal services and storage. Bharti Singh, “Is the Service-Led Growth of India Sustainable?”
International Journal of Trade, Economics and Finance 3, no. 4 (2012): 317-318. 68 Thomas, “Explaining the ‘Jobless’ Growth in Indian Manufacturing,” 674. 69 Seema Joshi, “From Conventional to New Services: Broadened Scope of Tertiary Sector,” The Indian
Journal of Labour Economics 49, no. 2 (2006): 327. 70 G.V. Vijayasri, “The Role of Information Technology (IT) Industry in India,” International Monthly
Refereed Journal of Research in Management & Technology 2 (2013): 54. 71 S. Annapoorna and Siddappa T. Bagalkoti, “Development of IT Sector in India: Analysis of Reasons and
Challenges,” Journal of Economics and Sustainable Development 2, no. 2 (2011): 28; Jeemol Unni and Uma
Rani, “Globalization, Information Technology Revolution and Service Sector in India,” Indian Journal of
Labour Economics 43, no. 4 (2000): 803-828. 72 Sumit K. Majumdar, Kenneth L. Simons and Ashok Nag, “Body Shopping Versus Offshoring among Indian
Software and Information Technology Firms,” Information Technology and Management 12 (2011): 19. 73 Nirvikar Singh, “Technology and India’s Economic Development,” UC Santa Cruz Economics Working
Paper No. 523 (2002): 1-32. The revised form of this paper is available also at SSRN:
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=345940 [accessed February 10, 2016]. Different types of
information are generally related to goods and services, about a subject or activity, arts or entertainment,
mentally processed and consumed information, and that which connected to sensation. However, here we are
concerned about the computer programming, system design, telecommunications, etc. that produce, process,
sell, and disseminate the information goods and services.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
67
and “Destination India,” bringing a new and broad-ranging appeal to its business and work culture.74
Additionally, a new recognition is given to India, acknowledging and appreciating her destiny as an
“IT Superpower” or “knowledge-based society” by outsiders and investors, and the IT industry thus
functions as a vehicle of this new and rapid socio-economic transformation.75 Increased initiatives
such as permitting 100 percent foreign investments, creating Export Processing Zones (EPZs) with
tax incentives and duty free exports and imports, etc., have been the general causative factors in
India’s IT boom.76 The supporting components for this development include: Indian professional and
technical education emphasis and the generation of a highly educated workforce in contrast to the
global shortage of IT talent, seemingly startling lower wages (a quarter of the US wages) and
comparatively low telecommunication costs, and factors like time difference, institutional changes
and quality reputation.77 Indian work culture and customs drastically changed due to the adoption
and adaptation of the ICT-driven globalized work practices and must be understood, therefore, within
the larger political and economic context. This will be analysed and explained in the later parts of
this section.
The Indian IT industry has been fertile ground for the growth of a new socio-economic and cultural
structure employing and encouraging innovative corporate practices and has been instrumental and
influential “in reversing the brain drain, raising India’s brand equity and attracting foreign direct
investment (FDI).”78 Referring to notable features in India’s IT industry, S. Annapoorna and
Siddappa T. Bagalkoti note the domination of software, BPO and recent KPO operations in the Indian
IT industry and its upward movement in the value chain by offering system interaction package
implementation and IT sourcing and consultancy.79 It is also said to have been mainly export driven,
with its excess export orientation and increased quality of products and services. Another salient
feature of this industry is its growing interest in visualizing an increased scope for the enlargement
of the domestic market through SOHO (small offices and home offices) and E-governance
initiatives.80 Thus, IT services lead to economic and social transformation, altering and upgrading
India’s position in the global economy.
Various IT services from India generally comprise ‘high end’ computer science research as well as
‘low end’ data entry or back office process services and function in various segments, such as IT
services (IT & ITES), business process management (BPM [includes BPO & KPO]), software
products and engineering services, and hardware manufacturing, processing and services.81 These
services largely invest in innovation, automation, and the Internet of Things (IoT)82 and adapt to the
74 Joshi, “From Conventional to New Services: Broadened Scope of Tertiary Sector,” 328. 75 Venkatanarayana Motkuri, “Workforce in Indian Information Technology (IT) Industry: Exploring NSS
Employment and Unemployment Survey,” MPRA Paper No. 48411, Centre for Economics and Social
Studies, Hyderabad (March 2009): 1. 76 Joshi, “From Conventional to New Services: Broadened Scope of Tertiary Sector,” 328. 77 Majumdar, Simons and Nag, “Body Shopping Versus Offshoring among Indian Software and Information
Technology Firms,” 19-20. See also, Annapoorna and Bagalkoti, “Development of IT Sector in India:
Analysis of Reasons and Challenges,” 30. 78 Nagesh Kumar and K. J. Joseph, “Export of Software and Business Process Outsourcing from Developing
Countries: Lessons from the Indian Experience,” Asia-Pacific Trade and Investment Review 1, no. 1 (2005):
91. 79 Annapoorna and Bagalkoti, “Development of IT Sector in India: Analysis of Reasons and Challenges,” 29. 80 Annapoorna and Bagalkoti, “Development of IT Sector in India: Analysis of Reasons and Challenges,” 30. 81 Carol Upadhya and A.R. Vasavi, “Work, Culture and Sociality in the Indian IT Industry: A Sociological
Study,” Final Report to the Indo-Dutch Program for Alternatives in Development, Indian Institute of Science,
Bangalore, 2006, 16. See also, India Brand Equity Foundation, “IT & ITES Industry in India,” Sectoral Report
2016, http://www.ibef.org/industry/information-technology-india.aspx [accessed February 28, 2016]. 82 The concept of Internet of Things (IoT) is defined as “a global infrastructure for the information society,
enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
68
changing marketplace of this era.83 Depending on their type, size and ownership, IT firms in India
are categorised as small/medium enterprises (SMEs), major Indian companies (MICs), and
multinationals or firms with foreign equity participation (MNCs/Fes).84 They are mostly engaged in
hardware and software production (development, maintenance, coding and testing) and solutions and
outsourcing services. In addition, it is now generally agreed that “[h]aving proven its capabilities in
delivering both on-shore and off-shore services to global clients, emerging technologies now offer
an entire new gamut of opportunities for top IT firms in India”85 and leads to a structural change in
India’s organizational workplace practices.
Nevertheless, as in the case of any structural change and development, researchers have criticised
and raised challenges that question the growth and sustainability of the Indian IT industry. These
arguments are directed at different areas of IT works and services. According to Annapoorna and
Bagalkoti, the first concern is about extensive export orientation, which becomes highly volatile with
varying international pressures. An excessive dependence on government concessions and
liberalizing state forms has created concerns about a time when these benefits may cease due to a
change of policies. Another concern is related to declining technical efficiency, or lower or
inadequate attention paid to the domestic market, and the emergence of serious competitors around
the globe.86 Finally, some have pointed to the problem of attrition and scarcity of specialized and
technical workforce as well as the issue of employment security, as “[t]here is no longer a guarantee
of lifetime employment, but lifetime employability is assured through continuous upgradation.”87
Despite all these lines of criticism, it is important to mention that lately the service sector, and its IT
industry in particular, have been a significant contributor to employment generation and the removal
of regional disparities with regard to work culture and practices, and thus been the largest provider
of the young Indian workforce with long-term careers and work plans.88 The initial fear of a large
amount of possible worker redundancy and increased unemployment from the advancement of
technology and computerization has been largely outweighed and surpassed as these revolutionary
processes have become the great employer of new technocratic era.89 For instance, many in the young
generation aspire to enter the Indian IT industry, both those who are highly skilled (employed in
interoperable information and communication technologies.” Ovidiu Vermesan et al., “Internet of Things
Strategic Research and Innovation Agenda,” in Internet of Things: Converging Technologies for Smart
Environments and Integrated Ecosystems, eds. Ovidiu Vermesan and Peter Friess (Alborg: River Publishers,
2013), 15. This definition was originally formed in the overview of the Internet of things by the International
Telecommunication Union (ITU-T Y.2060) in 2012. The impact of IoT is evidently visible in various arenas
of human life such as education, work life, communication, business, science, health, government, and
humanity itself and leaped enormously in data collection and distribution in particular. 83 Venkatesha Babu, “The Dream peddlers,” Business Today In, India Today Group Digital Magazines, 2015.
http://www.businesstoday.in/magazine/cover-story/bt-500-2015-indian-information-technology-services-
industry/story/224947.html [accessed February 28, 2016]. 84 Upadhya and Vasavi, “Work, Culture and Sociality in the Indian IT Industry,” 18. 85 India Brand Equity Foundation, “IT & ITeS Industry in India,” Sectoral Report 2016,
http://www.ibef.org/industry/information-technology-india.aspx [accessed February 28, 2016]. 86 Annapoorna and Bagalkoti, “Development of IT Sector in India: Analysis of Reasons and Challenges,” 31.
See also, Nagesh Kumar and K. J. Joseph, “Export of Software and Business Process Outsourcing from
Developing Countries: Lessons from the Indian Experience,” Asia-Pacific Trade and Investment Review 1,
no. 1 (2005): 91-110. 87 Annapoorna and Bagalkoti, “Development of IT Sector in India: Analysis of Reasons and Challenges,” 32. 88 Joshi, “From Conventional to New Services: Broadened Scope of Tertiary Sector,” 329. Indian IT industry
firms like Infosis, Cognizant, Wipro, Tata Consultancy Services, Accenture, etc. operating in different states
of India opens the windows of new job opportunities and thus takes away the Indian age-old dearth of
workforce to a great extent. See also, Mohit Dubey and Aarti Garg, “Contribution of Information Technology
and Growth of Indian Economy,” Voice of Research 2, no. 4 (2014): 50. 89 Annapoorna and Bagalkoti, “Development of IT Sector in India: Analysis of Reasons and Challenges,” 28.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
69
hardware and software sectors) and relatively less technically trained or even differently graduated
(admitted and occupied in ITES, BPO, and KPO industry).90 Seema Joshi writes, in this regard, that,
“with a phenomenal increase of employment in IT, BPO, etc. [...] it can be hoped that this primary
employment generation will also have a trickle-down effect in that the newly employed skilled
worker will create lots of secondary employment for semi-skilled and unskilled workers.”91
Acknowledging these new brackets of employment generation, we will analyse in what follows the
nature, structure and practices of the current Indian labour force.
2.1.4 The IT Workforce as Vanguard of a New Indian Working Class
The Indian labour force consisted of 430 million workers in 2004-2005, growing 2% annually in the
above discussed three sectors: (1) the rural (agricultural and allied sectors) workers (60%); (2) urban
organized (industrial) sector (8%); and the (3) urban informal (service) sector (32%).92 However,
there was incredible growth in the labour force later, with the increase in IT enabled services in India
for multiple reasons, which will be elaborated in the next section. Meanwhile, the Ministry of
Statistics and Programme Implementation of the Government of India, in its National Sample Survey,
shows in India, the labour force (employed & unemployed) increased from about 468.8 million (rural
male: 235.7, rural female: 106.5, urban male: 102.7 and urban female: 24.2) in 2010 to 483.7 million
(rural male: 238.8, rural female: 103.6, urban male: 112.5 and urban female: 28.8) in 2012.93 As per
the 2011-2012 survey of the National Sample Survey Office (NSSO), the total workforce is estimated
at 47.41 crore94 (470 million; rural: 33.69 crore; urban: 13.72 crore) among which 23.18 crore (230
million) persons were employed in agriculture and allied sectors, 11.50 crore (110 million) in
industries sector and 12.73 (120 million) in the service sector.95 Similarly, according to a report of
the World Factbook, in India, the labour force by occupation was 49% in agriculture, 20% in industry,
and 31% in services in 2012.96
Survey results of World Development Indicators by the World Bank, as shown in Exhibit 2,97 and of
National Sample Survey Office of Government of India, as in Exhibit 3,98 reveal that there has been
a rapid increase in the industrial and service sectors workforce during these years of technological
advancement, and that Indai has experienced progress in IT enabled services along with it.
90 Annapoorna and Bagalkoti, “Development of IT Sector in India: Analysis of Reasons and Challenges,” 29. 91 Joshi, “From Conventional to New Services: Broadened Scope of Tertiary Sector,” 329. 92 Growth of Trade Union Movement, http://www.whatishumanresource.com/growth-of-trade-union-
movement [accessed February 15, 2016]. 93 National Sample Survey Office, “Key Indicators of Employment and Unemployment in India,” NSS 6 th
Round, July 2011 – June 2012, Ministry of Statistics and Programme Implementation, Government of India,
2013, 25. 94 A crore denotes ten million in the Indian numbering system and is equal to 100 lakhs. In other words, it is
the sum of ten million of rupees. 95 National Sample Survey Office, “Key Indicators of Employment and Unemployment in India,” 25. 96 The World Factbook, “Economy: India,” Central Intelligence Agency, National Security Provider, the USA,
https://www.cia.gov/library/publications/the-world-factbook/geos/in.html [accessed February 16, 2016]. 97 World Development Indicators, “India: Distribution of the Workforce across Economic Sectors from 2000-
2012,” World Bank, http://www.statista.com/statistics/271320/distribution-of-the-workforce-across-
economic-sectors-in-india/ [accessed February 18, 2016]. 98 This is computed from unit level data of various NSSO rounds and published by the Institute for Human
Development, New Delhi and Academic Foundation, New Delhi, in the India Labour and Employment Report
2014. See for instance, India Labour and Employment Report 2014: Workers in the Era of Globalization
(New Delhi: AF and IHD, 2014), 51.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
70
Exhibit-2 Workforce Percentage 2000-2012
Exhibit-3 Sector-wise employment growth 1972-73/1983 to 2004-2005/2011-12
Analysing these studies, one can see a structural transformation in the labour force, as it shifts away
from agricultural labour, the share dropping from 59.8% in 2000 to 47.2% in 2012. An increased
movement of the workforce from industry to services can also be seen. However, since, India is still
classified as an agrarian economy and society in terms of workforce with a strong domestic
orientation99, we shall now analyse in detail India’s labour force in a tripartite system of agricultural-
rural, industrial-urban and service/knowledge-metropolitan workforce.
Agriculture is labour intensive in India, because it depends less on machines. The Green Revolution,
which started in 1966, was thus experienced as a significant breakthrough and led to a great increase
in the production of food grains and commercial crops. The agriculture sector spread over the entire
rural region of India provided employment (direct or indirect) to 53% of population in 2011-12,
compared to 72% of 1947.100 In 2011-12, in rural India, almost 59 percent of male workers and 75
percent of female workers were engaged in the agriculture sector. Recent studies observe a gradual
99 More labour-intensive sector in India remains as traditional agriculture than modern manufacturing or service
industries. It is because of the labour in production, manufacturing and service process extensively and largely
depends upon the technologies that are used across the industries and sectors. 100 P.V. Raghavan, R. Vaithianthan and V.S. Murali, General Economics for the CA Common Proficiency Test,
2nd ed. (Chandigarh: Pearson, 2015), B.11-12.
0%
20%
40%
60%
80%
100%
2000 20052010
2012
59.855
51.147.2
16.1 1922.4
24.7
24.1 25.2 26.5 28.1
Services
Industry
Agriculture
1.7
4.4 4.2
1.4
2.8
3.8
0.7
43.4
-2
4.5
2.1
-3
-2
-1
0
1
2
3
4
5
Primary Secondary Tertiary
1972-73/83
1983/93-94
1993-94/2004-05
2004-05/2001-12
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
71
decline in the rural India agriculture workforce, from 81% rural male in 1977-78 (67% in 2004-05)
to 59% in 2011-12 and from 88 % rural female in 1977-78 (83% in 2004-05) to 75% in 2011-12.101
This decrease is due to a lack of interest in agricultural labour caused by problems such as slow and
uneven growth, slow modernization of agriculture, defective land reforms and even problems related
to agricultural credit, marketing and warehousing.102 Further in this line, new use of modern
agricultural machinery reduced the need for a manual workforce.
At the same time, industrialization, largely in urban areas, absorbs people in large scale work and
offers productive employment. Almost 21.5% of the Indian labour force (31% of workers in medium
and small industries and 43% in large industries) was employed in the industrial sector in 2009-10.103
Among urban India male workers, 26% are engaged in trade, hotel and restaurant work, 22% in
manufacturing, and 21% in other service sectors such as construction (11%), transportation (12%)
and agriculture (6%), whereas urban female workers are engaged mostly in ‘other service’ sectors
(40%), manufacturing (29%), trade and restaurant (13%) and agriculture (11%).104 P.V. Raghavan
and others have noted some of the problems of industrial development in India, such as shortfalls in
industrial targets, under-utilization of capacity, inadequate infrastructure, high costs, sectoral and
regional imbalances, and industrial sickness.105 There is, thus, a conspicuous decrease of workers in
agriculture sectors or rural regions and an increase in industrial manufacturing and other services
based in urban areas.
However, just as in all developing countries, today the service sector is growing faster than in any of
the other commodity producing sectors in India.106 Being a prime destination for ‘high-tech’ and
information technology enabled services, India has transformed her local labour markets into a new
‘knowledge’ workforce, ushering in an entirely new epoch in her work-history.107 India’s tertiary
educational institutions and professional and technical colleges produce a large number of young
workers who are talented and skilled and trained in software services and ITES/BPO, and thus it has
a pool of graduates equipped to meet the demands of the IT industry.108 IT professionals and related
service workers are concentrated, according to the NSS 61st (2004-05),109 in the urban areas (93.2%)
allocated into various categories such as software consultancy and supply (49%), computer related
activities (15%), database activities (11.7%), and manufacture, repair and maintenance of computers
(22.3%).110 Today most outsourcing services and off-shoring firms and organizations function in
101 National Sample Survey, “Employment and Unemployment Situation in India 2011-12,” NSS 68th Round,
National Sample Survey Office, Ministry of Statistics & Programme Implementation, Government of India,
issued in 2014, 114. http://mospi.nic.in/Mospi_New/upload/nss_report_554_31jan14.pdf [accessed
February 25, 2016]. 102 Raghavan, Vaithianthan and Murali, General Economics for the CA Common Proficiency Test, B. 15-17. 103 Raghavan, Vaithianthan and Murali, General Economics for the CA Common Proficiency Test, B. 18-19. 104 National Sample Survey, “Employment and Unemployment Situation in India 2011-12,” 114. 105 Raghavan, Vaithianthan and Murali, General Economics for the CA Common Proficiency Test, B. 22-23. 106 Joshi, “From Conventional to New Services: Broadened Scope of Tertiary Sector,” 321. See also, Joshi,
Seema, “Tertiary Sector-Driven Growth in India: Impact on Employment and Poverty,” Economic and
Political Weekly 39, no. 37 (2004a): 11-17. 107 The hi-tech work stands for computer programming and software developing, whereas ITES looks for BPOs
and call centres. Cf, Carol Upadhya, “Taking the High Road? Labour in the Indian Software Outsourcing
Industry,” in Labour in Global Production Networks in India, eds. Anne Posthuma and Dav Nathan (New
Delhi, India: Oxford University Press, 2010), 301. 108 Thomas Barnes, “The IT Industry and Economic Development in India: A Critical Study,” Journal of South
Asian Development 8, no. 1 (2013): 66. 109 NSS 61st (2004-05) means the National Sample Survey 2004-2005 (61st round) on Employment and
Unemployment by National Sample Survey Organization (NSSO) – Government of India. 110 Venkatanarayana Motkuri, “Workforce in Indian Information Technology (IT) Industry: Exploring NSS
Employment and Unemployment Survey,” MPRA Paper No.48411, Centre for Economics and Social Studies,
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
72
India are based in metropolitan cities like Delhi, Mumbai, Pune, Hyderabad, Bangalore, Calcutta,
etc. and create a service/knowledge-metropolitan workforce. Thus, urban workers are increasingly
transformed into a metropolitan knowledge/service workforce, giving rise to a new Indian working
class.
In the traditional and conventional practices of India, presented in the first section above, “class
formation is substantively shaped by the reworking of inequalities of caste, language, religion and
gender [and] class as a category is constituted by these structures.”111 However, in close conjunction
with the transnationalized class identification of globalized and liberalized economic development,
the mounting IT workforce creates a new social structure that is forming and experiencing the
emergence of a new working class in India. This has happened in tandem with India’s engagement
with the global economy through her openness and participation in global IT trends. In any society,
determinations of class largely depend on an interplay of socio-cultural and economic factors, along
with a tendency to adopt and adapt to changing scientific and technocratic trends.112 Hence, workers
employed in the IT industry (or industries in the process of automated or computer based and non-
computer based service sectors) have been called the ‘new working class,’ and members of this
Indian IT & ITES workforce are portrayed as ‘proletarians within global business process’ and called
a white collar working class.113 This new working class functions as an agent of the globalized nation,
associating labours with high-tech, managerial efficiency and global economic competitiveness.114
This emerging workforce can be categorized generally as ‘service-contract’ employees and ‘labour
contract’ employees, depending on their characteristics such as duration (long-term or short-term),
authority, expertise (with or without qualifying degree), and employment security.115 These two types
of labourers, however, are identified, by themselves and by others, as the ‘creamy layers,’ given that
their status marked by Western-oriented lifestyles and professional identification with global
industry, and thus they gradually “[tend] to portray themselves as cosmopolitan, trendy, liberated
and global in outlook.”116 To identify some of defining features of this new working class, Maureen
O’Dougherty writes that they it tries to present and prove its status outwardly by both symbolic and
material actions of global consumption and seeks to secure a modern life at home and in society.117
In the same way, since English language facility and fluency are prerequisites of all transnational
outsourcing positions, language proficiency is a must for this workforce. This is a novel feature that
shows the convolution of old and new class structures.118
Although the service sector provides greater employment opportunities with wide-ranging high
growth of GDP, there have been consistent and multiple employment convolutions and labour
setbacks in this tertiary sector services, and in IT-related workplaces in particular. It is often noted
that the industry, for instance, with its functional and behavioural patterns creates “an increasingly
Hyderabad, 2009, 6. Also available at: https://mpra.ub.uni-muenchen.de/48411/1/MPRA_paper_48411.pdf
[accessed February 18, 2016]. 111 Leela Fernandes, India’s New Middle Class: Democratic Politics in an Era of Economic Reform
(Minneapolis, MN: University of Minnesota Press, 2006), 222. 112 Jonathan Murphy, “Indian Call Centre Workers: Vanguard of a Global Middle Class?” Work, Employment
and Society 25, no. 3 (2011): 418. 113 Murphy, “Indian Call Centre Workers: Vanguard of a Global Middle Class?” 420. 114 Fernandes, India’s New Middle Class, 35. 115 John Scott, “Social Class and Stratification in Late Modernity,” Acta Sociologica 45, no. 1 (2002): 25. 116 Murphy, “Indian Call Centre Workers: Vanguard of a Global Middle Class?” 420. 117 Maureen O’Dougherty, Consumption Intensified: The Politics of Middle-Class Daily Life in Brazil
(Durham, NC: Duke University Press, 2003), 112. O’Dougherty tries to explain the form of new middle class
by linking the consumer culture and social status. 118 Murphy, “Indian Call Centre Workers: Vanguard of a Global Middle Class?” 423.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
73
sharp and visible social and economic divide between those who work in the IT industry and those
who do not,” reflecting an enclave-type dynamic.119 Though the IT industry epitomizes the so-called
‘middle class’ and provides for upward mobility, social disparities tends to arise as the new IT
workforce emerges only from a “relatively affluent, forward caste, urban-dwelling, highly educated
and English-speaking background” and subsequent negligence and inattention of those who cannot
afford to participate in this movement.120 Various studies also suggest that employees “face acute
problems of excessive working hours, management pressure and the lack of opportunities for career
progression.”121 Although numerous studies have been conducted about the emergence, growth and
structure of India’s IT industry, the ethical and sociological implications of these changes for its
workforce, its most crucial resource, have not been sufficiently critically analysed. A brief account
of labour challenges and constraints is given in the following section, as these are among the least
addressed areas in the discussion of globalized IT employees in India.
2.2 LABOUR (EMPLOYMENT) TRENDS AND CHALLENGES IN GLOBALIZED IT-INDIA
Globalization, with its increased “cross-border transactions in the production and marketing of goods
and services that facilitates firm relocation to low labour cost countries,”122 deserves credit for
creating increased privilege many new opportunities for high-quality employment in developing
countries like India. As globalization has led to the increased mobility of persons as well as goods,
capital, data, and ideas, and thus enabled the free movement of labour, information technology (IT)
professionals have gained a privileged status with higher salaries, many employment opportunities
and comfortable working environments.123 However, the survival of domestic industries, small-scale
traders, and local products were at stake, as these same dynamics have led to a commercial
colonialism marked by the dominance of foreign industries and exploitation of human resources.124
Along this same line, we can see that factors such as privatization, flexibilization, and
individualization, along with excessive labour control and moitoring, coalesce the major labour
trends and challenges in globalized IT-India, which will be further discussed below.
Privatization is broadly defined as “the deliberate sale by a government of state-owned enterprises
(SOEs) or assets to private economic agents [...] and is one of the most important elements of the
119 Barnes, “The IT Industry and Economic Development in India: A Critical Study,” 67. Originally in Carol
Upadhya and A.R. Vasavi, “Work, Culture and Sociality in the Indian IT Industry: A Sociological Study,”
Final Report to the Indo-Dutch Program for Alternatives in Development, Indian Institute of Science,
Bangalore, 2006, 159. 120 Tom Barnes, “India’s IT Industry & Trade Unions: Are IT Workers Joining the ‘Precariat’? Labour in the
Asian Century: Thoughts and Analysis on Labour Movements in Asia and Beyond, 2015. See,
http://tombarnes.info/?p=259 [accessed February 25, 2016]. Also, in Jonathan Murphy, “Indian Call Centre
Workers: Vanguard of a Global Middle Class?” Work, Employment and Society 25, no. 3 (2011): 417-433. 121 Barnes, “The IT Industry and Economic Development in India: A Critical Study,” 67. See for instance,
Babu P. Remesh, “Work Organization, Control and ‘Empowerment’: Managing the Contradictions of Call
Centre Work,” in In an Outpost of the Global Economy: Work and Workers in India’s Information Technology
Industry, eds. Carol Upadhya and A.R. Vasavi (London: Routledge, 2008): 235-262. 122 Katherine VW Stone, “Flexibilization, Globalization, and Privatization: Three Challenges to Labour Rights
in Our Time,” in Regulating Labour in the Wake of Globalization: New Challenges, New Institutions, eds.
Brian Bercusson and Cynthia Estlund (Oxford: Hart Publishing, 2008), 115. Stone defines globalization as
“the cross-border interpretation of economic life.” Stone, “Flexibilization, Globalization, and Privatization,”
119. 123 Carol Upadhya, “Taking the High Road? Labour in the Indian Software Outsourcing Industry,” in Labour
in Global Production Networks in India, eds. Anne Posthuma and Dav Nathan (New Delhi, India: Oxford
University Press, 2010), 300. The employee comfort is often only projected, and not in effect because the
notion of ‘decent work environment’ is at risk when these jobs are highly insecure with long working hours,
monotonous work and volatility of demand. 124 Raghavan, Vaithianthan and. Murali, General Economics for the CA Common Proficiency Test, 151.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
74
continuing global phenomenon of the increasing use of markets to allocate resources.”125 According
to Stone, privatization refers to “policies that shift responsibilities and resources from the public
sphere to the private sector” based on the ideology of free market ‘neo-liberalism’.126 It entails the
reassigning of assets or service functions from public to private control, facilitating a dominance of
the private sector in wide areas of investments. It replaces government monopolies with private
competitive business groups and thus reduces the liability of the public sector and revives torpid
public firms by diversification and modernization.127 This is not without its setbacks. The
privatization of public goods always bring challenges. The aggregation of monopoly power to private
companies may encourage minimum investment and a drive for quick/maximum returns. This profit
motive alone makes companies less interested in social justice and public welfare, and disparities in
the distribution of income and wealth leads to class struggle and thus social inequality.128
The current process of privatization and the emerging IT trends in India face the challenge of rigid
labour contracts. New enterprises restructure workloads and hours and mount pressure to work
beyond individuals’ capacities, leading to a deterioration of employees’ mental and physical strength.
Minimum adherence to public labour laws and rights and a maximum observance of private
particular regulations and norms ruptures lasting relationships between management and labourers.
The ease of labour adjustments, compounded by the lack of labour social welfare systems, is an
emerging sensitive aspect of IT labour trends in the wake of privatization, and a discrepancy in the
distribution of welfare is often apparent.129 The loss of collective power and association is another
major challenge. A new global market logic questioned the value of state intervention and the
established rights of workers and led to another labour reform, one that caused a disappearance of
regular and sustaining jobs and weakened the conventional base of unions.130 This type of neo-liberal
reform individualizes labour relations and promotes the independent freedom to hire and fire workers
at will. In the same way, despite the alleged labour market rigidity in the organized IT sectors, job
security is highly uncertain as people are not able to protest the loss of their jobs.
The flexibilization of labour is one of the key trends in IT-enabled India, as well as a major challenge.
The presence of a large informal economy in developing countries such as India makes the labour
situation highly flexible. Stone defines flexibilization as “the changing work practices by which firms
no longer use internal labour markets or implicitly promise employees lifetime job security, but
instead seek flexible employment relations that permit them to increase or diminish their workforce
and reassign and redeploy employees with ease.”131 Spatial mobility provides significant socio-
cultural and economic exposure, by enabling employees to work in different countries. However, a
high rate of short-term projects and contract works within and outside the country to increase labour
mobility and often goes into a ‘human resource augmentation mode,’ disregarding the stable life
125 William L. Megginson and Jeffry M. Netter, “From State to Market: A Survey of Empirical Studies on
Privatization,” Journal of Economic Literature 39 (2001): 321. According to Megginson and Netter, “there
has been a mixture of public and private ownership of the means of production and commerce [...], state
ownership of the means of production, including mills and metal working [...] while private ownership
[which] was more common in trading and money lending.” Megginson and Netter, “From State to Market: A
Survey of Empirical Studies on Privatization,” 322. 126 Stone, “Flexibilization, Globalization, and Privatization,” 121. 127 Raghavan, Vaithianthan and. Murali, General Economics for the CA Common Proficiency Test, B.146-147.
See also, John Vickers and George Yarrow, “Economic Perspectives on Privatization,” Journal of Economic
Perspectives 5, no. 2 (1992): 111-132. 128 Raghavan, Vaithianthan and. Murali, General Economics for the CA Common Proficiency Test, B.147. 129 Kikeri, “Privatization and Labour: What happens to Workers when Governments Divest?” 9. 130 Shyam Sundar, “Trade Unions and the New Challenges,” 905. 131 Stone, “Flexibilization, Globalization, and Privatization,” 115.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
75
chances and leading to adverse consequences for labourers.132 This is fundamentally detrimental to
job performance and individual career success. For space plays a crucial role in enhancing and
refining human feeling and perception and in materializing human values, and contributes “to
demarking social roles and defining relations and thereby broadly serving to predispose individuals
to act and perceive actions in certain ways rather than others.”133
Furthermore, in India, employment takes different and more flexible forms as part-time, temporary,
or contract work with regard to time limits, as well as in further flexible progress in the work process,
in workforce itself, and in organizational forms.134 This is called the ‘temporal flexibility’ of labour.
It dismantles or abandons the consistency, permanence, and longevity of the ‘internal labour market’
built during the twentieth century.135 It also facilitates or enables lower capital costs and raises output
capacity and potential employment. However, the formality of contract here is frequently low, and
the length of engagement is typically short. Christine B. Tayntor rightly observes in this regard that
“[b]ecause of the short-term and ad hoc nature of hiring contractors, IT can move quickly, bringing
on additional staff for specific projects and removing them as soon as the work is complete.”136
Although Carol Upadhya acknowledges that “[f]rom the industry point of view, temporary staffing
enhances flexibility in the deployment of human resources,” she adds that “but for employees it is a
highly insecure form of employment.”137 This contingent nature of flexibility, with short-term or
episodic characteristics, breaks the bond between worker and firm138 and reduces the likelihood of
convening non-wage labour costs and the demands of job protection legislation.139 Even though
labour flexibility has “implications for building careers, organizing workers, and developing
progressive labour market policies,” it can also “worsen wage inequality, job insecurity, and other
labour market conditions and outcomes”140 along with causing spatio-temporal alienation of
employees’ work satisfaction and inhibiting their work progress.
132 Human resource augmentation model or staff augmentation allows contract basis or temporary staff for a
particular project in a particular place and avoids general hiring/de-hiring costs and full-time payments. The
economic benefits are at best in this practice when specific skills are required for short-term engagements.
However, employees are terminated as the contract (short-term) expires along with the completion of
particular task and thus the job security is at risk and these employees are not entitled to the employee benefits
and rights. The project requirements as special skills make it training intensive and labour engagements with
the hard requisites in short notice and in different locations bring further challenges of health and life. See,
Christine B. Tayntor, “A Practical Guide to Staff Augmentation and Outsourcing,” Information Management:
Strategy, Systems, and Technologies, 2001.
http://www.ittoday.info/AIMS/Information_Management/2-01-01.pdf [accessed February 28, 2016]. 133 Värlander, “Individual Flexibility in the Workplace: A Spatial Perspective,” 38. This conceptualization of
space is adopted from the work of Yi-Fu Tuan originally published in 1997 and has 8th reprint in 2001. See,
Yi-Fu Tuan, Space and Place: The Perspective of Experience (Minneapolis: University of Minnesota press,
2001), 102. 134 Upadhya, “Taking the High Road? Labour in the Indian Software Outsourcing Industry,” 305. Several
distinct process of labour flexibilization as a feature of the Western post-industrial economy is well explained
by Chris Benner. He explains the nature of labour market flexibility and how it is related to the deep structural
transformations of the economy. He develops a conceptual frame work of flexibilization denoting the
distinction between the flexibility in work and in employment. Cf. Chris Benner, Work in the New Economy:
Flexible Labour Markets in Silicon Valley. Oxford: Blackwell, 2002, 11-21. 135 Stone, “Flexibilization, Globalization, and Privatization,” 116. 136 Tayntor, “A Practical Guide to Staff Augmentation and Outsourcing,” 4. 137 Upadhya, “Taking the High Road? Labour in the Indian Software Outsourcing Industry,” 306. 138 Stone, “Flexibilization, Globalization, and Privatization,” 116. 139 Klau and Mittelstadt, “Labour Market Flexibility,” 14. 140 Chigon Kim, review of Work in the New Economy: Flexible Labour Markets in Silicon Valley, by Chris
Benner, American Journal of Sociology 109, no. 1 (2003): 233-234. For detailed description see for instance,
Benner, Work in the New Economy: Flexible Labour Markets in Silicon Valley, 203-231.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
76
The process of individualization, however, as a symptom of advanced modernization, marks another
trend in IT workplaces and poses further challenges for the workforce. For instance, recruitment,
sustenance, promotions and salaries all reasonably depend upon an individual’s performance, and
thus individual competition is increasingly encouraged for rewards and job security. This
compromises workers’ sense of collective identity, however, fragmenting the collectivity.141 The
increased employee individualization, according to Irakli Gvaramadze, “contributes to outsourcing
responsibilities and duties, which increases stress, doubt, uncertainty and ambiguity among the
employees.”142 Excessive individual competition in the IT workplace gradually leads to over-work,
long working hours, and stress. There is an effort to clear one’s career path and protect one’s position
in the organizational context rather than showing a commitment to individual, organizational, or
societal development. Consequently, individualization in the IT workplace, as Upadhya illustrates,
acts against the ideals of teamwork, cooperation, and sociability.143 It tends to intensify competition
and mobility, to increase levels of stress and lead one to refuse collective structures.144
Individualization in IT workplaces in India adversely intensifies individualistic labour relations over
against a traditional sense of collective identity. Continuous re-skilling has to be encouraged to
ensure that employees are able to compete with the fast-changing needs and requirements of IT jobs
and secure a place in the job market.
Global “body shopping” and “off-shoring” and their respective consequences of transnationalization’
and ‘virtual migration’ have been identified as alarming challenges facing the Indian IT industry.145
Body shopping, according to Xiang Biao, “is arguably a uniquely Indian practice whereby an Indian-
run consultancy (body shop) anywhere in the world recruits IT workers, in most cases from India, to
be placed out as project-based labour with different clients.”146 However, contrary to what is
generally assumed, IT services of programming, testing, debugging, etc. are very labour intensive
and thus most Indian IT workers who have migrated through body shopping are forced to work in
tedious and repetitive “donkey work” situations.147 Body shopping leads to the selling of ‘bodies’ as
if they were Indian groceries, as opposed to earlier practices of ‘head-hunting’ in business-related
recruitments. In the same vein, off-shoring produces new forms of mobility (since ‘knowledge work’
moves) and immobility (since a body never moves) in the body shopping process. This has been
called ‘virtual migration’.148
The process of the spatial and temporal integration of virtual migration brings with it further labour
challenges, such as “spatio-temporal alienation.”149 Spatial integration occurs when data
141 Upadhya, “Taking the High Road? Labour in the Indian Software Outsourcing Industry,” 308. See also,
Laurent Taskin and Velérie Devos, “Paradoxes from the Individualization of Human Resource Management:
The Case of Telework,” Journal of Business Ethics 62, no. 1 (2005): 14. 142 Gvaramadze, “Human Resource Development Practice,” 466. 143 Upadhya and Vasavi, “Work, Culture and Sociality in the Indian IT Industry,” 84. 144 Mythen, “Employment, Individualization and insecurity,” 133. 145 There are three types of IT outsourcing services in India: (1) onsite consultancy (working within the client’s
premises), (2) contract work (getting contracts and work from different localities), and (3) the mixed case of
onsite and offsite work or services. Sumit K. Majumdar, Kenneth L. Simons and Ashok Nag, “Bodyshopping
versus Offshoring among Indian Software and Information Technology Firms,” Information Technology and
Management 12 (2011): 19. 146 Xiang Biao, Global “Body Shopping”: An Indian Labour System in the Information Technology Industry
(Princeton: Princeton University Press, 2007), 4. 147 Biao, Global “Body Shopping”: An Indian Labour System in the Information Technology Industry, 5. 148 Upadhya, “Taking the High Road? Labour in the Indian Software Outsourcing Industry,” 303. Upadhya
opines that in the off-shore model of working, professionals “located in India are logged onto the computer
networks of their customers abroad, working on projects as part of ‘virtual teams’ consisting of colleagues,
managers, and customers spread across several geographical locations.” 149 Aneesh, Virtual Migration: The Programming of Globalization, 67-98.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
77
communication networks unfasten work performance from a worksite, while temporal integration
brings together different time zones. Finally, in a nutshell, as Seema Joshi rightly observes, “[t]he
close monitoring, continuous work assessments, less number of holidays, absence of organizational
activities and promotion of individualization leads to isolation on the one hand and reduces the scope
for establishing trade unions on the other.”150 Among these challenges the issue of ‘close monitoring,’
within the scope of our research, will be elaborated on and further discussed in the following section.
For unlike conventional workplaces and offices, organizational workplace in the software industry,
ITES offices and BPOs track and monitor employees both on-the-job and off-the-job with the help
of various tools of technological advancement, and these employees often experience adverse effects.
2.3 EMPLOYEE SURVEILLANCE AS A MODERN WORKPLACE CHALLENGE IN INDIA
Modern management practices in general try to solve the challenges of maximizing control,
conformance, discipline, reliability, and predictability.151 Along with these important organizational
virtues, managers often create other challenges related to the very technologically dependent
agencies of work, especially in the IT and ITES workplaces and among those employing electronic
surveillance. Though the specific parameters of surveillance vary both in quantity and quality in
relation to organizational differences, performative and behavioural monitoring and the ubiquitous
nature of its applications are mostly increasing in Indian workplaces, and particularly in those
enabled with ICT152. The management ideology of monitoring practices is being criticized:
[T]he availability of a technological capacity does not mean it will necessarily be deployed [...].
Managers may or may not be aware of the potential of technologies for monitoring, and if they
are aware, they will still weigh the benefits of implementing surveillance process against the
perceived costs and benefits to the organization. Further, even in sites [...] where surveillance is
routine, whether or not staff are disciplined or penalized for variations form the normative
procedures depends on management practices and priorities.153
Technology provides or functions only as a tool for data to be collected, analysed and interpreted.
Yet continuous and easy monitoring through technological viability makes and transforms
‘monitoring work’ to ‘surveillance of workers’ and demands a transformed management strategy.154
It has been observed that employees face new forms challenges due to the volatile requirements of
global standard business and its functional practice of direct or ‘panoptical’ control over workers and
150 Joshi, “From Conventional to New Services: Broadened Scope of Tertiary Sector,” 330. See also, Babu P.
Ramesh, “‘Cyber Coolies’ in BPO: Insecurities and Vulnerabilities of Non-Standard Work,” Economic and
Political Weekly 39, no.5 (2004): 496. 151 Polly LaBarre, “New Management Principles for a New Age,” Management Innovation eXchange (MIX),
http://www.managementexchange.com/blog/new-management-principles-new-age [accessed February 15,
2016]. 152 Ernesto Noronha and Premilla D’Cruz, Employee Identity in Indian Call Centres: The Notion of
Professionalism (New Delhi: Response Books, 2009), 12. 153 David Mason, Graham Button, Gloria Lankshear, and Sally Coetes, “Getting Real about Surveillance and
Privacy at Work,” in Virtual Society? Technology, Cyberbole, Reality, Steve Woolger, ed. (Oxford: Oxford
University Press, 2002), 100. Ernesto Noronha and Premilla D’Cruz are of the same opinion that “it is relevant
to acknowledge that management has a choice about whether to implement any or all of the monitoring
capacity of the ICTs. [...] the ability to monitor calls does not necessarily translate into the practice of
monitoring.” Noronha and D’Cruz, Employee Identity in Indian Call Centres, 12. 154 Mary Prior, “Surveillance-Capable Technologies in the Workplace,”
http://rccs.southernct.edu/surveillance-capable-technologies-in-the-workplace/ [accessed February 18,
2016]. Further problems and emerging challenges of this gradual but auto-transformation, from ‘work
monitoring’ (performance monitoring or process monitoring) to ‘monitoring of workers,’ will be critically
and extensively analysed in the second part of this study.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
78
the work process.155 This practice has been called the ‘electronic panopticon’ by Graham Sewell and
Barry Wilkinson, “where a disembodied eye can overcome the constrains of architecture and space
to bring its disciplinary gaze to bear at the very heart of the labour process.”156 This has a drilling
effect on employees and is a major challenge of the Indian organizational workplace today. However,
before explaining this, next in order, by placing the distinctive socio-cultural and economic scenarios
at the forefront, we need to consider the reasons why electronic monitoring and surveillance is so
widely used today in Indian organizations.
2.3.1 Indian Circumstantial Rationale behind the Workplace Surveillance
The emergence of sophisticated monitoring technologies around the globe, often at affordable prices,
has led to an increase in employee surveillance in Indian organizations. Apart from the previously
discussed purposes of electronic surveillance, such as measuring and improving performance,
preventing theft and other risk factors, and ensuring proper adherence to the rules and policies of the
workplace, there are few specific reasons for its implementation in thean Indian organizational
context, due to India’s particular socio-cultural and economic scenarios.
Quality Management is for the most frequently cited justification for surveillance in Indian
organizations.157 In the wake of globalization, liberalization, and privatization, Indian organizations
now find themselves in a quality race with regard to their products and services. Quality is redefined
in the Indian organization, extending to client and consumer satisfaction as well as the redesign of
products and services.158 The quality of products or services from India introduces, in addition to the
anticipated benefits, new and increased forms of surveillance that are “in apparent contradiction to
the official rhetoric of worker initiative and autonomy.”159 The quality assessing processes of ‘Just-
In-Time’ (JIT) and ‘Total Quality Management’ (TQM), for instance, enlarge the profit motive and
lead to a substantial increase in surveillance practices. Just-in-time is a strategy to increase efficiency
by utilizing a company’s full capacity and decreasing inventory costs by eliminating waste and
receiving only vital goods, and thereby maximizing a company’s benefits and profit.160 According to
Vikas Kumar, JIT “combines apparently conflicting objectives of low cost, high quality,
manufacturing flexibility, and delivery dependability.”161 Total Quality Management offers a
different but complementary means to reach the quality objective of a product or service. TQM
155 Upadhya and Vasavi, “Work, Culture and Sociality in the Indian IT Industry,” ii. 156 Graham Sewell and Barry Wilkinson, “Someone to Watch Over Me: Surveillance, Discipline and the Just-
in-Time Labour Process,” Sociology 26 (1992): 283; Prasad, “International Capital on “Silicon Plateau”:
Work and Control in India’s Computer Industry,” 444. 157 Rosemary Batt, Virginia Doellgast, Hyunji Kwon and Vivek Agarwal, “Service Management and
Employment Systems in U.S. and Indian Call Centres,” Brookings Trade Forum, Offshoring White-Collar
Work (2005): 341. 158 Raj Kumar, Dixit Garg and T.K. Garg, “Total Quality Management in Indian Industries: Relevance,
Analysis and Directions,” The TQM Journal 21, no. 6 (2009): 607. 159 Upadhya and Vasavi, “Work, Culture and Sociality in the Indian IT Industry,” 64. Monika Prasad,
“International Capital on “Silicon Plateau”: Work and Control in India’s Computer Industry,” Social Forces
77, no. 2 (1998): 439-440. 160 Sultan Singh and Dixit Garg, “JIT System: Concepts, Benefits and Motivation in Indian Industries,”
International Journal of Management and Business Studies 1, no. 1 (2011): 26. Cf. Gurinder Singh and
Inderpreet Singh Ahuja, “An Evaluation of Just-in-Time Initiatives in the Indian Industries,” International
Journal of Quality & Reliability Management 32, no. 6 (2015): 559-588. 161 Vikas Kumar, “JIT Based Quality Management: Concepts and Implications in Indian Context,”
International Journal of Engineering Science and Technology 2, no. 1 (2010): 40.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
79
involves the study of customer satisfaction, effective coordination of management and employees,
statistical quality control, communication systems, and cost involvement, etc.162
However, although JIT and TQM include inventory control, quality control, and production
management, the lack of an adequate standard for implementing them and a lack of internalization
of these concepts163 leads also to the maximization of other external forces, such as electronic
surveillance methods. This is done with an aim to make best use of available time and resources and
thus perk up the quality of products and services. The initiatives of JIT and TQM, according to
Monika Prasad “were associated with intensification, job-loss, increased monitoring and direct
control and limited promotion opportunities.”164 Similarly, quoting Sewell & Wilkinson (1992), she
notes that in the Indian organizational context these regimes of JIT and TQM “create and demand
systems of surveillance which improve on those of the traditional bureaucracy in instilling discipline
and thereby consolidating central control and making if more efficient.”165 Both JIT and TQM
recognize the capacity of workers to become quality analysers and thus participants in the decision-
making process. But the application and practice of intrusive monitoring techniques to manage
quality conversely erodes the trust and responsibility invested in them and enforces more rigid
workplace control.
Concomitant with these strategies is Technological Over-Dependency and the misuse of technology
by both employees and management.. The improper use of technologies, for instance, has become a
pervasive problem in the workplace, with rigorous implications for management and organizations
in the forms of low productivity, security breaches and liability and legal concerns.166 To explain this
further, cyberslacking – the misuse of time, resources, etc., for non-work purposes during working
hours (known also as cyberloafing or cyberbludging) – is widespread in Indian organizational
workplaces due to employees’ easy access to internet.167 Similarly, Cyberbullying, as a catch-all term
to represent this misuse, is defined “as a behaviour that involves the use of cell phones, instant
messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass,
threaten or intimidate or support deliberate, repeated, and hostile behaviour by an individual or group
intended to harm others.”168 This is often done on the presumption that no one knows the
162 Kumar, Garg and Garg, “Total Quality Management in Indian Industries,” 608-609. Harjeev Kumar
Khanna, S.C. Laroiya and D.D. Sharma, “Quality Management in Indian Manufacturing Organizations: Some
Observations and Results from a Pilot Survey,” Brazilian Journal of Operations & Production Management
7, no. 1 (2010): 141-162; Namish Mehta, Prakash Verma and Nitin Seth, “Understanding Total Quality
Management in Context: International and Indian Service Industry,” Current World Environment 4, no. 2
(2009): 285-292. 163 Kumar, “JIT Based Quality Management,” 40; B. Mahadevan, “Are Indian Companies Ready for Just-in-
Time,” IIMB Management Review 9, nos. 2, 3 (1997): 86. 164 Prasad, “International Capital on “Silicon Plateau”: Work and Control in India’s Computer Industry,” 443.
Originally in Janette Webb, “Vocabularies of Motive and the ‘New’ Management,” Work, Employment, and
Society 10 (1996): 269. 165 Prasad, “International Capital on “Silicon Plateau”: Work and Control in India’s Computer Industry,” 443;
Graham Sewell and Barry Wilkinson, “Someone to Watch Over Me: Surveillance, Discipline and the Just-
in-Time Labour Process,” Sociology 26 (1992): 277. 166 Joseph C. Ugrin, J. Michael Pearson and Marcus D. Odom, “Profiling Cyber-Slackers in the Workplace:
Demographic, Cultural, and Workplace Factors,” Journal of Internet Commerce 6, no. 3 (2007): 76. 167 Premilla D’Cruz and Ernesto Noronha, “Navigating the Extended Reach: Target Experiences of
Cyberbullying at Work,” Information and Organization 23 (2013): 324-325; R. Venkatapathy and
Madhumathi M., “Use of Technology and Counterproductive Work Behaviour,” Paripex: Indian Journal of
Research 5, no. 4 (2016): 56; and Joseph C. Ugrin, J. Michael Pearson and Marcus D. Odom, “Profiling
Cyber-Slackers in the Workplace: Demographic, Cultural, and Workplace Factors,” Journal of Internet
Commerce 6, no. 3 (2007): 75-89. 168 Rotimi Taiwo, “Cyber Behaviour,” in Encyclopedia of Information Science and Technology, 3rd ed., ed.
Mehdi Khosrow-Pour (Hershey, PA: Information Science Reference, 1015), 2979.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
80
wrongdoings,169 suggesting that the absence of a moral check increases distraction among employees.
Therefore, it is essential at this point from an employers’ perspective to uncover the dynamics of this
growing issue in the Indian organizational workplace and take various remedial or preventive
measures. To this end, and to eliminate the pressure and opportunities monitoring mechanisms have
been largely used in the Indian organizational work context.
The Performance Attributes of the Indian socio-cultural scenarios, discussed above, and the
workplace behavioural patterns they promote, seem to further necessitate the monitoring of
employees in Indian organizational workplaces. For example, Indian workers often take a cautious
approach (non-committal) in complex decision-making situations and avoid making a decision until
they are assured of a favourable outcome by a superior, or until a superior simply decides for them.170
Low work-quality consciousness and the ready postponing of delayed or incomplete work to the next
day are quite normal in the Indian work contexts.171 Similarly, another rampant problem in
organizational workplaces in India is wasting time, and “coupled with dishonesty and bureaucracy,
this issue poses a formidable challenge to [...] business in India.”172 To maintain an expected level of
performance, external monitoring is implemented. Likewise, workers’ priorities are widely linked to
family, caste, religious adherence, political ideologies, etc.,173 and these outside pressures often lead
employees to use workplace resources in matters beyond the working process and relationships. To
ward off these employees’ vulnerability and concerns, employers apply strict monitoring procedures.
Power Control and Inequality in the contractual relationship174 between employer and employee in
the organizational work context in India, discussed above, enables a superior to monitor an inferior
with or without his or her consent. Surveillance in this contextual scenario of power is perceived as
exploiting the vulnerability of the subordinate: “the organization that might have higher power in the
contractual relationship is infringing the employee’s [...] individual rights.”175 It is seen also as an
effort to maintain technological decorum by imitating Western models of management, which
invariably highlight contractual power distance. To the same extent, the practice of subcontracting
work in Indian organizations encourages employee monitoring, since the organization wants to keep
performance metrics always far above the ground.176 Forcontract enforcement, as researchers like
Rosemary Batt, Virginia Doellgast and Hyunji Kwon opine, is ensured through extended and
continuous monitoring practices, which articulate in turn subcontractors’ adherence to performance
metrics and place them under intense pressure to meet the same efficiency goals and targets.177
Human Resource Profusions in India have also encouraged the use of electronic and other monitoring
systems in organizations. For since India has an abundance of qualified labour force, rigid
surveillance practices allow management to screen, select and retain honest and suitable employees
and, even in an unfair manner, to dismiss poor performers and replace them with others who are
169 Ugrin, Pearson and Odom, “Profiling Cyber-Slackers in the Workplace,” 87. 170 Anshuman Khare, “Japanese and Indian Work Patterns: A Study of Contrasts,” in Management and Cultural
Values: The Indiginization of Organizations in Asia, Henry S. R. Kao, Durganand Sinha, and Bernhard
Wilpert, (New Delhi: Sage Publications, 2002), 127. 171 Khare, “Japanese and Indian Work Patterns: A Study of Contrasts,” 127. 172 Khare, “Japanese and Indian Work Patterns: A Study of Contrasts,” 131. 173 Khare, “Japanese and Indian Work Patterns: A Study of Contrasts,” 129. 174 Sandeep K. Krishnan, Biju Varkkey, and Anush Raghavan, “Employee Privacy at Workplaces: Some
Pertinent Issues,” Research and Publication Department (No. WP2006-02-04), Indian Institute of
Management Ahmedabad, 2006, 4. 175 Krishnan, Varkkey, and Raghavan, “Employee Privacy at Workplaces: Some Pertinent Issues,” 4. 176 Batt, et al., “Service Management and Employment Systems in U.S. and Indian Call Centres,” 339. 177 Batt, et al., “Service Management and Employment Systems in U.S. and Indian Call Centres,” 339.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
81
skilled and efficient.178 In this way, we can also see an economic reason for the use of monitoring
technologies in the Indian workplace. For instance, a human supervisor is substituted for a
technological supervisor, and constant observation and control are exacerbated and intensified,
which articulate not the scarcity of human resource but the strategic economic agenda. Electronic
monitoring systems are used here only as performance management technologies, which are
invariably used by client companies to monitor the employees of their contracted companies.179 Here,
man-power is not replaced by techno-power, but unconstructively complemented and broadened by
it. Premilla D’Cruz and Ernesto Noronha observe the same, and opine that “the employment of call
centre technology as a monitoring and measurement device did not spell the end of human
supervision.”180 For, with a master screen at a centre point there are persons overlooking and keeping
an eye on every operation. Our point here is that this situation exacerbates the effects of power control
and enlarges power distance.
For many reasons, then – decreasing job performance and productivity, misuses of company
resources, and issues such as cyber slacking –espionage in the Indian organizational work context is
on the rise. This orientation of surveillance practices in India is also similar to the classical Taylorism,
which held that “to increase productivity and reduce costs by monitoring the use of time and the
performance of tasks, and by devising methods to save time and increase productivity.”181 However,
invasive and persistent practices of surveillance can be manipulative and focus so much on the
activities being monitored and the effort to alter statistics that the organization’s overall performance
is negatively affected.182 Poor Constitutional and Legislative Security with regard to surveillance and
employee rights increases the outsized implementation of such technologies and practices in India to
scrutinize the individual worker.183 Apart from the constitutionally recognized fundamental rights –
including the right to freedom and right to life and personal liberty – there is no explicit reference to
the nature or extent of surveillance or to a right to privacy. The following section provides an
overview of constitutional rights, acts, or legislative regulations in India related to workplace
surveillance and statutory safeguards.
2.3.2 India’s Legal Frameworks Governing the Workplace Surveillance
Surveillance systems are used in various agencies and departments of the Indian central Government.
These include: the National Intelligence Grid (NIG), the Crime and Criminal Tracking Network
System (CCTNS), the Central Monitoring System (CMS), the Unique Identification Authority of
India (UID Scheme), the Indian Computer Emergency Response Team (CERT-In), and the National
Counter Terrorism Center (NCTC).184 Though these agencies administer and exercise their functions
with specific rules and regulatory norms pertaining to each department, the lack of laws specifically
governing surveillance in India hinders its general application. To contextualize this issue, we should
178 Krishnan, Varkkey, and Raghavan, “Employee Privacy at Workplaces: Some Pertinent Issues,” 4. 179 Batt, et al., “Service Management and Employment Systems in U.S. and Indian Call Centres,” 339. 180 Premilla D’Cruz and Ernesto Noronha, “Hope to Despair: The Experience of Organizing Indian Call Centre
Employees,” The Indian Journal of Industrial Relations 48, no. 3 (2013): 473. 181 Upadhya and Vasavi, “Work, Culture and Sociality in the Indian IT Industry,” 65. 182 Michael Blakemore, “Surveillance in the Workplace: An Overview of Issues of Privacy, Monitoring, and
Ethics,” Briefing Paper for GMB, 2005, http://www.mindfully.org/Technology/2005/Surveillance-
Workplace-Blakemore1sep05.htm [accessed April 10, 2016]. 183 Krishnan, Varkkey, and Raghavan, “Employee Privacy at Workplaces: Some Pertinent Issues,” 6. 184 Maria Xynou and Elonnai Hickok, “Security, Surveillance and Data Sharing Schemes and Bodies in India,”
2015, 1-15, http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf
[accessed April 18, 2016]. Partha Pati and Nishith Pandit, “Surveillance in India and Its Legalities,” Legally
India, June 2013, http://www.legallyindia.com/Blogs/surveillance-in-india-and-its-legalities [accessed April
10, 2016].
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
82
note that the advent of globalization and its consequent liberalization and privatization marked the
shift in labour laws and policies with a global framework, which prompted new measures to handle
the new labour situations and its challenges. Increased mass surveillance, made possible by
technological advancement, creates along with its benefits an extensive infringement of privacy and
individual liberty. In this milieu of invasion into human rights and interests, it is untoward and
regrettable that specific laws governing surveillance in India are lacking, especially in the corporate
and organizational workplace context.
However, the Indian legislature has passed certain rules and acts that indirectly govern surveillance,
such as the Information Technology Act of 2000 (“IT Act”), the Information Technology
Amendment Act of 2008, the Indian Telegraph Act of 1885, Information Technology (Procedure and
Safeguard for Interception, Monitoring and Decryption of Information) Rules of 2009, and the Right
to Privacy Bill of 2011.185 These acts deal with digital and telephonic surveillance in general. The IT
Act of 2000, for example, “widely regulates the interception, monitoring, decryption and collection
of information of digital communications in India.”186 It also ensures civil and criminal liability in
regard to hacking, electronic voyeurism, identity theft, redundant and unauthorized disclosure of
obtained information, etc. Likewise, the amendment introduced to the IT Act in 2008 grants
mandatory data protection in Indian law related to the protection of individual rights. The Information
Technology (Reasonable Security Practices and procedures and Sensitive personal information)
Rules of 2011 further guarantees reasonable security for sensitive personal information.187
Workplace surveillance remains an unregulated area, however, that has not been specifically
addressed either by the Indian cyber laws or by labour laws. Labour laws widely focus on the safe
working conditions, assuring workers non-discriminatory wages in the organized sectors and seeking
to ensure fair and secured work environments.
A.C. Fernando observes that unlike in countries like the United States, where privacy and individual
rights are valued and legally guaranteed against invasion of any kind, in India the focus is on
employee surveillance to protect corporate interests, not employees’ interests or individual rights
such as a right to privacy.188 Having no proper and relevant legislation, the imposed technological
monitoring exposes the individual worker to unprecedented and constant scrutiny, and there is
nothing an employee can do so long as this absence of specific surveillance or privacy laws
persists.189 Remarkably, the cyber laws address the issue of data privacy and rights of both the
employer and the employee on to a minimum extent.190 We will explain this in detail in the next
chapter, where we deal with the nature and issues of privacy and individual rights.
The IT (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information)
Rules of 2011 nevertheless provide detailed guidelines about the limit and extent of data collection,
185 Partha Pati and Nishith Pandit, “Surveillance in India and Its Legalities,” Legally India, June 2013,
http://www.legallyindia.com/Blogs/surveillance-in-india-and-its-legalities [accessed April 10, 2016]. 186 This IT Act 2000, especially its section 69, directs and empowers both central and state governments to
issue directives for monitoring via computer and internet resources, and its succeeding collection, retention,
and transmission of data. “Sate of surveillance India,” March 2016.
https://privacyinternational.org/node/738 [accessed April 25, 2016]. 187 The Information Technology Rules 2011.
http://deity.gov.in/sites/upload_files/dit/files/GSR3_10511(1).pdf [accessed April 20, 2016]. 188 A.C. Fernando, Business Ethics and Corporate Governance (Delhi: Pearson, 2010), 6.8. 189 Fernando, Business Ethics and Corporate Governance, 6.9. 190 Rakhi Jindal, Gowree Gokhale and Vikram Shroff, “The Indian Legal Position on Employee Data Protection
and Employee Privacy,” Employment & Industrial Relations Law (March 2012): 47-49.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
83
retention and transmission.191 Likewise, even though no particular law governs the extent of allowed
monitoring in the workplace, Indian Constitution provides and directs States to ensure and secure
just and humane work conditions.192 However, the problem continues as this framework does not
provide workers any remedy for unjust and inhumane work environments. Since these regulations
and restrictions are neither comprehensive nor particular enough to the practices of surveillance in
the organizational workplace, the government should issue a legal framework specific to workplace
surveillance.
2.3.3 Employee Concerns: Power Control and Workplace Bullying
Technologically enabled mechanisms of surveillance generally allow organizations to obtain the
objectives of rationalization (performance maximization, cost minimization) and standardization
(quality check).193 However, Babu P. Ramesh compares the degree of surveillance at work with the
situation in nineteenth century prisons, or even the Roman slave ships.194 For when employees
become subjects of incessant monitoring and all workplace interactions and behaviours are recorded,
creating a feeling among employees of being constantly observed and scrutinized, this can be a
psychological torture for many.195 From the same angle, the Foucauldian concept of the ‘panoptic
gaze’ in relation to workplace surveillance has further implications, such as “the institutionalized
acceptance of management prerogatives, [...] an inevitable extension of the managerially imposed
control system, [...] the intensification of labour process,”196 and goes beyond the limits of mere
disciplinary control. Thus the work processes and behaviours that are closely monitored are in
conflict with an Indian work culture traditionally based on openness, individual initiative, loyalty,
trust and informality,197 and brings about unequal power relationships by bestowing power on the
monitoring agent over the monitored.198
This unequal power relation exacerbates workplace bullying.199 Adapting from Stale Einarsen et al.,
workplace bullying is defined by Premilla D’Cruz as “subtle and/or obvious negative behaviours
embodying aggression, hostility, intimidation, and harm, characterized by repetition and persistence,
displayed by an individual and/or group and directed towards another individual and/or group at
work in the context of an existing or evolving unequal power relationship.”200 The growing and
191 It expresses also the necessity of the informed consent for the collection and disclosure of information. See
for instance, The Gazette of India: Extraordinary, Part II-Sec 3 (i), Ministry of Communication and
Information Technology, New Delhi, April 2011.
http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf [accessed April 18, 2016]. 192 The Constitution of India, article 42. This we have already discussed and referred in the first chapter. 193 Babu P. Remesh, “Work Organization, Control and ‘Empowerment’: Managing the Contradictions of Call
Centre Work,” in In an Outpost of the Global Economy: Work and Workers in India’s Information Technology
Industry, eds. Carol Upadhya and A.R. Vasavi (London: Routledge, 2008): 246. 194 Babu P. Ramesh, “‘Cyber Coolies’ in BPO: Insecurities and Vulnerabilities of Non-Standard Work,”
Economic and Political Weekly 39, no.5 (2004): 495. See also Remesh, “Work Organization, Control and
‘Empowerment’: Managing the Contradictions of Call Centre Work,” 246. 195 Remesh, “Work Organization, Control and ‘Empowerment’: Managing the Contradictions of Call Centre
Work,” 246. 196 Peter Bain and Phil Taylor, “Entrapped by the ‘Electronic Panopticon’? Worker Resistance in the Call
Centre,” New Technology, Work, and Employment 15, no. 1 (2000): 4. 197 Upadhya and Vasavi, “Work, Culture and Sociality in the Indian IT Industry,” 66. 198 Neil M. Richards, “The Dangers of Surveillance,” Harvard Law Review 126 (2013): 1954. 199 Premilla D’Cruz and Charlotte Rayner, “Bullying in the Indian Workplace: A Study of the ITES-BPO
Sector,” Economic and Industrial Democracy 34, no. 4 (2012): 599. 200 Premilla D’Cruz, Workplace Bullying in India (New Delhi: Routledge, 2012), xv; Stale Einarsen, Helge
Hoel, Dieter Zapf, and Cary L. Cooper, “The Concept of Bullying and Harassment at Work: The European
Tradition,” in Bullying and Harassment in the Workplace: Developments in Theory, Research, and Practice,
2nd ed., eds. Stale Einarsen, Helge Hoel, Dieter Zapf, and Cary L. Cooper (London: Taylor & Francis, 2011),
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
84
excessive monitoring of work is an example of bullying in the Indian workplaces. Involving an abuse
or misuse of power, workplace bullying in Indian organizational workplace context refers to a
repeated and unreasonable act directed towards employees that intimidates, degrades, offends or
humiliates them.201 The hierarchical nature of Indian society, which is also reflected in the
organizational workplace and its management models, is much linked to issues of the exercise of
power domination in the surveillance process. Thus, workplace bullying through excessive
monitoring in India isolates or stigmatizes individual employees who experience severe adverse
effects of this phenomenon.202 This brings forth unwarranted criticism, indifferent treatment via
exclusion and social isolation, and high stress and consequent increase in psycho-physical problems,
and invariably affects employees’ well-being.
The rigid and panoptical systems and techniques of monitoring fasten the individual employee
sturdily to his or her machine.203 Closed-circuit video cameras around the workplace bring further
panoptical capacity, which is even continued and fostered by centralized computer systems that make
it possible to map all activities of the employee.204 It leads to lesser task performance in complex
situations and impedes working relationships. As Monica T. Whitty reports, the presence of the other
– the other’s social presence, that is – often impairs performance on a difficult task and has
deleterious effects on employees, leading to greater stress and less satisfaction.205 It makes
employees feel insecure and decreases their morale, leading to a gradual decline in the quality and
duration of relationship. Likewise, along with disrupting employees’ “right to work at their own pace,
[surveillance] guided by their own moral compass, [...] fosters mistrust”206 and proves detrimental to
productivity and the overall performance of organizations. Some studies reveal that the decrease in
monitoring reduces quit-rates in organizations – high monitoring leads to high quit rates.207 This
means that extensive and repetitive monitoring, along with high performance targets, has increased
attrition rates in the Indian organizational workplace.208
Several researchers observe in the same way that surveillance increases stress, and causes depression
and emotional exhaustion and burnout.209 For instance, Daria Panina opines that in any general
context, “electronic monitoring is an intrusion into worker privacy, represents a lack of trust toward
employees, and often leads to excessive control and work pacing by management.”210All those
3-28. See also Stale Einarsen, “The Nature and Causes of Bullying at Work,” International Journal of
Manpower 20, nos. 1/2 (1999): 16-27. 201 D’Cruz and Rayner, “Bullying in the Indian Workplace,” 599-600; D’Cruz, Workplace Bullying in India,
xv. 202 D’Cruz, Workplace Bullying in India, xvii. 203 Upadhya and Vasavi, “Work, Culture and Sociality in the Indian IT Industry,” 139. 204 Upadhya and Vasavi, “Work, Culture and Sociality in the Indian IT Industry,” 141. 205 Monica T. Whitty, “Should Filtering Software be Utilized in the Workplace? Australian Employees’
Attitudes towards Internet Usage and Surveillance of the Internet in the Workplace,” Surveillance and Society
2, no. 1 (2004): 41. 206 Priya Iyer, “Electronic Surveillance of Employees – Pros and Cons,” Human Resources, December 07,
2012.
http://www.supportbiz.com/articles/human-resources/electronic-surveillance-employees-%E2%80%93-
pros-and-cons.html [accessed April 15, 2016]. 207 Batt, et al., “Service Management and Employment Systems in U.S. and Indian Call Centres,” 343. 208 Stephen Deery, Vandana Nath and Janet Walsh, “Why do Off-Shored Indian Call Centre Workers Want to
Leave Their Jobs?” New Technology, Work and Empowerment 28, no. 3 (2013):213. 209 Batt, et al., “Service Management and Employment Systems in U.S. and Indian Call Centres,” 342. David
Holman, “Employee Well-Being in Call Centres,” in Call Centres and Human Resource Management, eds.
Stephen Deery and Nick Kinnie (Basingstoke: Palgrave, 2004), 223-244. 210 Daria Panina, “Electronic Monitoring in the Workplace,” in Encyclopedia of Human Resources Information
Systems: Challenges in e-HRM, eds. Teresa Torres-Coronas and Mario Arias-Oliva (Hershey, NY:
Information Science Reference, 2009), 314.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
85
globally experienced impacts of employee monitoring, such as a loss of self-esteem, lack of fair-
process, increased voyeurism, persecution of whistleblowers, and detrimental effects on productivity,
etc.,211 are equally experiences in the Indian organizational workplace. For surveillance proves
detrimental to the normal expectations and concerns of Indian employees in regard to work, namely,
freedom in their job, creative performance, trust from their employer and colleagues, reliable
commitment, security of personal data, efficiency in work, and understanding and appreciation, etc.
Extensive monitoring leads employees to work in a stereotypical way – like a robotic image or in a
mechanized form. They become, as George Ritzer and Craig D. Liar claim, overly regimented,
dependent and overwhelmed by this practice of control, and thus devoid of autonomy and unable to
bring their ‘selves’ to work.212
The virtual possibility and actual usage of data collected through monitoring to intimidate and punish
employees rather than help them improve is quite common in India. In this context, workers
individually and collectively demonstrate their capacity to resist this increasing control of electronic
panopticon.213 Quoting Alan McKinlay and Phil Taylor, Benjamin P.W. Ellway argues that worker
resistance has been a ‘daily reality’ at different “levels of consciousness, effectiveness and strength
across a workplace and over time.”214 Similarly, a few researchers such as Ellway and David Knights
and Darben McCabe admit the risks entailed by the individualistic and fragmentary nature of this
resistance.215 New and emerging forms of employee resistance will be illustrated in the following
section, on the call centre industry. All these consequences are clearly apparent in the Indian
organizational situation, along with their socio-ethical response. This will be investigated in the
second and third part of this research. However, in view of the increasing experience of a high degree
of monitoring and extensive use of technology-aided control mechanisms in the Indian call centres,216
in the final section here we take Indian call centres as an example to further investigate and elucidate
the challenges of electronic surveillance in the Indian context.
2.3.4 A Case Study Analysis: The Indian Call Center (BPO) Industry
In this final section, we discuss issues related to one of the most central problems experienced in the
Indian call centre sector: increasing workplace monitoring, its implications, how to tackle this
growing problem.217 It is useful to investigate the call centre industry because, despite its
211 Jay P. Kesan, “Cyber-Working or Cyber-Shirking? A First Principles Examination of Electronic Privacy in
the Workplace,” Florida Law Review 54 (2002): 319-320. 212 George Ritzer and Craig D. Liar, “The Globalization of Nothing and the Outsourcing of Service Work,” in
Service Work: Critical Perspectives, eds. Marek Korczynski and Cameron Lynne MacDonald (New York:
Routledge, 2009), 31-52. 213 Benjamin P.W. Ellway, “Making It Personal in a Call Centre: Electronic Peer Surveillance,” New
Technology, Work and Employment 28, no. 1 (2013): 38; Peter Bain and Phil Taylor, “Entrapped by the
‘Electronic Panopticon’? Worker Resistance in the Call Centre,” New Technology, Work, and Employment
15, no. 1 (2000): 2-18. 214 Ellway, “Making It Personal in a Call Centre: Electronic Peer Surveillance,” 5. Originally in Alan McKinlay
and Phil Taylor, “Commitment and Conflict: Worker Resistance to HRM in the Microelectronics Industry,”
in The Handbook of Human Resource Management, 2nd ed., ed. B. Towers (Oxford: Blackwell, 1996), 470. 215 Ellway, “Making It Personal in a Call Centre: Electronic Peer Surveillance,” 5. See also David Knights and
Darben McCabe, “What Happens When the Phone Goes Wild? Staff, Stress and Spaces for Escape in a BPR
Telephone Banking Work Regime,” Journal of Management Studies 35, no. 2 (1998): 163-194. 216 Babu P. Remesh, “Work Organization, Control and ‘Empowerment’: Managing the Contradictions of Call
Centre Work,” in In an Outpost of the Global Economy: Work and Workers in India’s Information Technology
Industry, eds. Carol Upadhya and A.R. Vasavi (London: Routledge, 2008): 246. 217 A call centre is defined generally as “any communication platform from which firms deliver services to
customers via remote, real-time contact.” Per Norling, “Call Centre Companies and New Patterns of
Organization,” Economic and Industrial Democracy 22, no. 1 (2001): 155. However, a tripartite definition
expresses that, in call centres, (1) employees are engaged in specialist operation which integrate
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
86
contemporaneous emergence and considerable growth and employment rates, little research has been
done about the experiences of employees in this sector. Our analysis is based on studies conducted
by Carol Upadya and A.R. Vasavi on the Work, Culture and Sociality in the Indian IT Industry (2006)
and other studies of more limited relevance, for instance, Winifred R. Poster (2011) and Premilla
D’Cruz and Ernesto Noronha (2013), on workers in India’s information technology industry, with a
specific focus on call centres.218 As a cornerstone in service industries and part of Business Process
Outsourcing (BPO), call centres in India, unlike in any other developing countries, have been
growing at a fast pace especially in the past decade.219 As noted, the liberalization of the Indian
economy from 1991 onward, other subsequent changes in government policy, and the emergence of
high quality academic institutions have all driven this phenomenal growth.220 The availability of a
well-educated, qualified and English speaking workforce, combined with relatively low labour costs,
time zone advantages, favourable state and central government policies and regulations, and rapid
and constant adaptation to new and emerging technologies, have all in fact increases this boom in
India.221
This phenomenal success notwithstanding, this growth has also created numerous problems, such as
poor career development, increased stressful working conditions, enlarged concerns for security, and
high employee turnover, etc., that have even had an impact on the growth rate of this industry.222
Moreover, call centres are said to be the “archetypal organization to represent Foucault’s application
of Bentham’s Panopticon to the workplace.”223 Computer and information technologies are widely
used in the call centres, and besides helping to increase work efficiency, they can also be exceedingly
ruthless monitoring tools.224 Thus, the panopticon is a predominant metaphor for surveillance and
telecommunications and information systems technologies; (2) their work is controlled by automatic systems
which virtually simultaneously distribute work, control the pace of that work and monitor their performance;
and (3) they are in direct contact with the customer through dealing with in-bound calls, making out-bound
calls or a combination of the two.” N. Kinnie, J. Purcell and S. Hutchinson, “Modelling HR Practices and
Business Strategy in Telephone Call Centres,” Paper presented to the Workshop on Call Centres, Center for
Economic Performance, London School of Economics, March 19, 1999, 6. 218 Carol Upadya and A.R. Vasavi conducted their studies basing on the call centres of South India (especially
in Bangalore) where as Winifred R. Poster based himself on call centres in North India (New Delhi, Gurgaon,
Noida). 219 Pawan S. Budhwar, “Doing Business in India,” Thunderbird International Business Review 43, no. 4 (2001):
554-556. The inception, growth, and nature of the call centre industry in India is well explained by Ernesto
Noronha and Premilla D’Cruz (2009). They illustrate first the sectoral overview of India’s ITES-BPO industry
and then continue explaining its organizational landscape, nature of work, and employment patterns. Basing
on the empirical research on working in Indian call centres, they also elucidate the features of recruitment
and training, work systems and job design, personal and social life, remuneration and working conditions,
cultural dimensions and gender issues, and managerial concerns. See for instance, Noronha and D’Cruz,
Employee Identity in Indian Call Centres, 33-58. Babu P. Remesh also gives the same descriptions on Indian
call centres from a control and empowerment perspective. See Babu P. Remesh, “Work Organization, Control
and ‘Empowerment’: Managing the Contradictions of Call Centre Work,” in In an Outpost of the Global
Economy: Work and Workers in India’s Information Technology Industry, eds. Carol Upadhya and A.R.
Vasavi (London: Routledge, 2008): 235-262. 220 Budhwar, “Doing Business in India,” 558-560. 221 Winifred R. Poster, “Who’s on the Line? Indian Call Center Agents Pose as Americans for U.S.-Outsourced
Frims,” Industrial Relations 46, no. 2 (2007): 274; Kavil Ramachandran and Sudhir Voleti, “Business Process
Outsourcing (BPO): Emerging Scenario and Strategic Options for IT-enables Services,” Vikalpa 29, no. 1
(2004): 49-62; Rafiq Dossani and Martin Kenney, “Lift and Shift; Moving the Back Office to India,”
Information Technologies and International Development 1, no. 2 (2003): 21-22. 222 Harsimran Singh, “Is the BPO Iceberg Melting Under Attrition Heat?” The Economic Times, February 10,
2005, http://articles.economictimes.indiatimes.com/2005-02-10/news/27490856_1_attrition-heat-bpo-hr-
managers [accessed April 5, 2016]. 223 Ray Hingst, “Perceptions of Working Life in Call Centres,” Journal of Management Practice 7, no. 1
(2006): 2. 224 Hingst, “Perceptions of Working Life in Call Centres,” 2.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
87
management in these call centres. Interpreting call centre surveillance, Sue Fernie and David H.
Metcalf write that the panopticon was truly the vision of the future for call centres.225 However, Peter
Bain and Phil Taylor critically respond to this in a polemic way, expressing uncertainty about the
intruding and invasive gaze and exercise of such a prototypical form of discipline and control.226
Bain and Taylor rigorously point to the ideological narrowness of regarding workplace surveillance
as part of a management control strategy and regard the Foucauldian notion of discipline in the same
way.227 For them, it is a mistake to believe that monitoring will result in complete managerial control.
Upadya and Vasavi, comparing the studies of various ‘critical organizational’ theorists with their
own research, argue that the nature and methods of control employed globally in BPOs are the same
in the Indian call centre context.228 Work in the call centre is distributed by an Automatic Call
Distribution (ACD) system, which also controls the flow of calls and services to the centre and to
employees. This automated system functions as a tracking tool and continually monitors the
concerned parameters of the work, such as average handling time (AHT) and number of calls handled
in a shift, etc., to evaluate the performance and productivity.229 The same system can be said to
amount to a panoptical controlling system, by which all movements of individual employees are
known to the management230 and in this way it can be a complete intruding phenomenon. This
concept of functional systems becoming an ‘electronic panopticon’ has been discussed by
mainstream researchers of call centre work and progression. For instance, Diane van den Broek,
analyzing two Australian call centres, argues that these call managing and distributive systems, when
they function as a control system to capture the minute details of each call, not only reduce employees
to ‘self-disciplining subjects’ of the organization but often amount to managerial coercion.231 Along
this same line, Donald J. Winiecki writes that this electronic panopticon is “a technological practice
of surveillance that facilitates the objectification and subjectification and occasionally domination of
the labouring subject.”232 These concepts will be analysed in detail later in this research.
Upadhya and Vasavi observe that these digitalized systems of control “create ranks of ‘cyborg’
workers who are completely welded to their workstations.”233 The term “cyborg” is an abbreviated
form of the term “cybernetic organism,” i.e. a being which has both organic and biomechatronic body
parts.234 Insistent and continuous monitoring of both quantitative and qualitative aspects of employee
225 Sue Fernie and David H. Metcalf, (Not) Hanging on the Telephone: Payment Systems in the New Sweatshops
(London: Centre for Economic Performance, London School of Economics, 2000), 2. 226 Peter Bain and Phil Taylor, “Entrapped by the ‘Electronic Panopticon’? Worker Resistance in the Call
Centre,” New Technology, Work, and Employment 15, no. 1 (2000): 4. 227 Bain and Taylor, “Entrapped by the ‘Electronic Panopticon’?” 5. 228 Upadhya and Vasavi, “Work, Culture and Sociality in the Indian IT Industry,” 144. 229 Upadhya and Vasavi, “Work, Culture and Sociality in the Indian IT Industry,” 145. 230 Upadhya and Vasavi, “Work, Culture and Sociality in the Indian IT Industry,” 146. 231 Diane van den Broek, “We have the Values: Customers, Control and Corporate Ideology in Call Centre
Operations,” New Technology, Work and Employment 19, no. 1 (2004): 2-13. Broek here identifies the
management imposed normative and cultural control and such mechanisms impacts employees and negatively
influence their behaviours. Donald J. Winiecki, adapting Foucauldian genealogical perspective in analysing
technology-mediated labour in call centres, also makes the same observation in his study. See, for instance,
Donald J. Winiecki, “Shadowboxing with Data: Production of the Subject in Contemporary Call Centre
Organizations,” New Technology, Work and Employment 19, no. 2 (2004): 78-95. 232 Winiecki, “Shadowboxing with Data,” 79. 233 Carol Upadhya and A.R. Vasavi, “Outposts of the Global Information Economy: Work and Workers in
India’s Outsourcing Industry,” in In an Outpost of the Global Economy: Work and Workers in India’s
Information Technology Industry, ed. Carol Upadhya and A.R. Vasavi (London: Routledge, 2008): 30. 234 The term cyborg is first used by Manfred Clynes and Nathan S. Kline in 1960 to explain artifact-organism
systems that would extend man’s unconscious, self-regulatory controls. See for instance, Manfred E. Clynes
and Nathan S. Kline, “Cyborgs and Space,” Astronautics (September 1960): 26-27, 74-76. Donna Haraway
defines cyborg as “a cybernetic organism, a hybrid of machine and organism, a creature of social reality as
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
88
performance make them typical cyborgs in the organization. Upadhya and Vasavi emphasize this
fact when they argue that this type of control via the electronic panopticons by management in Indian
call centres “is near-complete and workers have little autonomy or space for manoeuvre.”235 This
situation of excess control, according to Upadhya and Vasavi, becomes the foundation or source of
indispensable resistance on the part of employees taking up, though weighed down with difficulties,
formal and informal strategies.236 These resistance strategies include, on the one hand, regular and
constant absenteeism, high labour turnover, and acts of sabotage and subversion, and on the other,
employees often find ways to outmanoeuvre these persistent and insidious technologies of control.237
Several researchers, such as George Callaghan, Paul Thompson (2001) and Alison Barnes (2004),
on the nature and features of monitoring and control in the call centre industry, have observed the
same concept of resistance invariably practiced among employees, and opine that employees
manipulate control systems and technologies to gain control over performance statistics and work
processes, 238 and thus support the observation of Upadya and Vasavi.
In view of their potential to optimize supervision and control process, electronic monitoring and other
surveillance practices have become central to a new managerial strategy for human resource
management.239 This shows that, as part of this new management strategy, surveillance “has
introduced novel and insidious structures of power and inequality”240 by allowing management “to
extract ever more surplus value from workers.”241 Referring to the concept of ‘coercion versus care’
of Sewell and Barker (2006), which we have discussed already in our first chapter, Upadhya
elucidates that along with its panoptical effect, organizational control colonises the very selves of
workers through its insidious modes of subjective control.242 Besides, employees often perceive the
surveillance practices imposed on them, such as the pressure to increase the performance rate to a
standard level and minimize errors and faults, as highly oppressive and emotionally demanding.243
In an equal manner, the constant pressure of being under the watchful eye of the other, the ‘big
brother,’ affect and associate negatively with the well-being of employees.244 This severely inhibits
a free and open working environment.
well as a creature of fiction.” Donna Haraway, Simians, Cyborgs and Women: The Reinvention of Nature
(New York: Routledge, 1991), 149. She writes that “by the late twentieth century we are all chimeras,
theorized and fabricated hybrids of machine and organism; in short we are Cyborgs.” Haraway, Simians,
Cyborgs and Women: The Reinvention of Nature, 150. See also David Gunkel, “We Are Borg: Cyborgs and
the Subject of Communication,” Communication Theory 10, no. 3 (2000): 332. 235 Upadhya and Vasavi, “Outposts of the Global Information Economy,” 31. 236 Upadhya and Vasavi, “Outposts of the Global Information Economy,” 31. 237 Upadhya and Vasavi, “Outposts of the Global Information Economy,” 31. 238 George Callaghan and Paul Thompson, “Edwards Revisited: Technical Control and Call Centres,”
Economic and Industrial Democracy 22, no. 1 (2001): 13-37; Alison Barnes, “Diaries, Dunnies and
Discipline: Resistance and Accommodations to Monitoring in Call Centres,” Labour and Industry 14, no. 3
(2004): 127-137. 239 Panina, “Electronic Monitoring in the Workplace,” 315. 240 Carol Upadhya, “Controlling Offshore Knowledge Workers: Power and Agency in India’s Software
Outsourcing industry,” New Technology, Work and Employment 24, no. 1 (2009): 6. 241 Upadhya, “Controlling Offshore Knowledge Workers,” 9. 242 Upadhya, “Controlling Offshore Knowledge Workers,” 9. 243 David Holman, “Employee Well Being in Call Centres,” Human Resource Management Journal 12, no. 4
(2002): 35; Josh Healy and Tom Bramble, “Dial ‘B’ for Burnout? The Experience of Job Burnout in a
Telephone Call Centre,” Labour and Industry 14, no. 2 (2003): 39-59; and Sebastiano Bagnara and Patrizia
Marti, “Human Work in Call Centres: A Challenge for Cognitive Ergonomics,” Theoretical Issues in
Ergonomics Science 2, no. 3 (2001): 223-237. 244 Holman, “Employee Well Being in Call Centres,” 36; Healy and Bramble, “Dial ‘B’ for Burnout? The
Experience of Job Burnout in a Telephone Call Centre,” 49.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
89
Winifred R. Poster, in his research on Indian call centres, observes that monitoring extends its targets
beyond the physical movements of employees to a deeper level, touching their inner emotional states
and features of their identity.245 Given that the work done in call centres concerns interactive services
and not goods production, there is a high probability that surveillance will extend to a “radically
invasive technological control on people’s bodies and mental constitution”246 and have more coercive
consequences. By disentangling the structure of seeing surveillance as a singular practice of control
of the privileged few (with employers as the elites) over subordinates (employees as the herd), Poster,
in his assessment of Indian call centres, proposes a framework for pluralizing the web of multi-
surveillances by which many groups participate in monitoring and exert power in certain degrees
over one another.247 These include, as Poster illustrates, managers (local staff who runs call centres),
workers (employees in Indian call centres), vendors (firms that design, market and sell technologies
to call centres), clients (who purchase or contract customer support services from call centres), and
customers (consumers or the target groups that clients sell products to or handle questions from).
Each of these actors uses surveillance and uses the power it affords then in different ways and at
various levels.248 This marks, for Poster, the pluralisation of surveillance and ensuing spectrum of
power in Indian call centres.
Poster, in his research, also identifies a spectrum of motives behind the use of surveillance in Indian
call centres. In his view, the exercise of power in Indian call centres in a surveillance context is
twofold: on the one hand, “the exercise of authority can be hidden,” and on the other, “the range of
power can extend beyond just the ostensible targets.”249 Though he tries to “reframe surveillance as
social movement strategy – one that is used for the purpose of rebalancing power in favour of the
marginalized,”250 the other motives and agencies such as domination, emotional displays and identity
crisis are equally and critically prevalent in employee surveillance. For instance, the process of
domination is evidently observed, as surveillance technology is used to impose power over a good
number of employees and thus equalize their performance standards.251 In the same way, surveillance
targets features of individual identity such as emotional displays of anger and pleasantness, and these
expressive and non-expressive factors of employees are detected and often further analysed.252
Hence, finally, in the context of surveillance in Indian call centres, the relationship between
management and employees is an interesting question and worthy of its own investigation. To an
extent, surveillance opens the way for corrupt or improper behaviour by the controller of data,
increasing the risk of coercion, blackmail, and discriminative practices.253
Equally important are the observations of Premilla D’Cruz and Ernesto Noronha, who confirm the
same problem of the possibility and nature of the corrupt behaviour of surveilling agent(s). According
to them, managers often use the data from continuous monitoring of employees for instant messaging
and alerts even outside of a work context. This often turns out to be a threatening formula for
employees and a typical example of harassment, technically called cyberbullying.254 To the same
extent, Noronha and D’Cruz, in their work Employee Identity in Indian Call Centres, write, quoting
245 Winifred R. Poster, “Emotion Detectors, Answering Machines, and E-Unions: Multi-Surveillances in the
Global Interactive Service Industry,” American Behavioural Scientist 55, no. 7 (2011): 868-901. 246 Poster, “Emotion Detectors, Answering Machines, and E-Unions,” 869. 247 Poster, “Emotion Detectors, Answering Machines, and E-Unions,” 871. 248 Poster, “Emotion Detectors, Answering Machines, and E-Unions,” 873-874. 249 Poster, “Who’s on the Line?” 276. 250 Poster, “Emotion Detectors, Answering Machines, and E-Unions,” 896. 251 Poster, “Emotion Detectors, Answering Machines, and E-Unions,” 896. 252 Poster, “Emotion Detectors, Answering Machines, and E-Unions,” 896. 253 Richards, “The Dangers of Surveillance,” 1935. 254 Premilla D’Cruz and Ernesto Noronha, “Navigating the Extended Reach: Target Experiences of
Cyberbullying at Work,” Information and Organization 23 (2013): 324-343.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
90
Knights and McCabe (1998), that “while management is achieving increased control in one way,
they are losing it in another. [...] management can pinpoint their staff’s productivity in terms of idle,
wrap or live time; however, statistics can be, and are being, manipulated by staff.”255 Similarly,
Brenda McPhail observes that as the face of management shifts from personal or direct control to
statistical or indirect control, the possibility of these statistics being manipulated by staff and other
members becomes very high.256 Recognizing this, D’Cruz argues for a well-designed practice that
aligns with employee needs and expectations in the organizational workplace. For, the mode of
relationship between management and staff is changing in Indian call centres, as the task of personal
supervision is now largely performed with the aid of information and communication technologies.257
This change happens also in relation to the tight control and extensive measurement, that invariably
intrudes into the life of employees as well as to the increasing experiences and events of further
manipulation of the data and life chances.
To conclude this section, we may note that surveillance and its attendant power control totalizes all
aspects of regulating employee behaviour. Through this type of total control, organizations guarantee
that “employee self-interests and disruptions are minimized and organizational objectives are served,
[...] whereby organizations seek to shape the subjectivity of their employees with a view to ensuring
organizational effectiveness.”258 However, this type of subjectivity alteration or identity regulation,
according to Noronha and D’Cruz, forms part of organizations’ socio-ideological (values, beliefs,
emotions, etc.) control process that reaches to the very core of employees’ identity.259 To the same
extent, the imposition of power, controlling employees’ cognition and emotions, manipulates
employees’ very being,260 eliminates all possibility for self-expression and self-realization and
causes work intensity and stress. Similarly, job quality in general is one of the major concerns of
Indian call centres, which have often been investigated from a labour process perspective concerned
with specific aspects of work-related behaviours of employees.261 However, these impose an
unprecedented degree of control over employees that negatively affect their effectiveness,
productivity and well-being. In the following chapters, we analyze the problems posed by excessive
and persistent electronic surveillance and its impacts and implications, along with the labour process
and employment relationships from an interdisciplinary perspective. To this end, by analysing the
Foucauldian electronic panopticon perspective, we employ sociological, ethical, and theological
frameworks.
2.4 CONCLUSION
The themes highlighted in this chapter from a unique Indian work culture perspective include the
following: cultures and multiculturalism; transferring concentrations of activity in different sectors
and a progressive flexibilization of labours; ethics, moral values and social responsibilities; new
organizational environments with new dynamic engagements; a reinvention of old and invention of
new management styles; globalization, liberalization, privatization and labour consequences; and
workplace surveillance and its implications. The sum of India’s business culture is the sum of various
socio-cultural and economic norms and standards followed by its people. The foregoing overview of
255 Noronha and D’Cruz, Employee Identity in Indian Call Centres, 15. Originally in David Knights and Darben
McCabe, “What Happens When the Phone Goes Wild? Staff, Stress and Spaces for Escape in a BPR
Telephone Banking Work Regime,” Journal of Management Studies 35, no. 2 (1998): 183. 256 Brenda McPhail, What is ‘On the Line’ in Call Centre Studies? A Review of Key Issues in the Academic
Literature (Toronto: Faculty of Information Studies, University of Toronto, 2001), 46. 257 Knights and McCabe, “What Happens When the Phone Goes Wild?” 183. 258 Noronha and D’Cruz, Employee Identity in Indian Call Centres, 158. 259 Noronha and D’Cruz, Employee Identity in Indian Call Centres, 160. 260 Noronha and D’Cruz, Employee Identity in Indian Call Centres, 160. 261 Hannif, “Job Quality in Call Centres: Key Issues, Insights and Gaps in the Literature,” 2.
Indian Prospects for Socio-Economic Advancement and Employee Surveillance
91
Indian workplace culture and management models shows that work organizations (national,
transnational, multinational, or international) in India are open to socio-cultural, political and
economic (inherent and adapted) forces and trends. Traditional business and organizational work
culture in India is largely influenced by high power distance (hierarchical), a high level of
collectivism, the caste system, rigidities of the labour market, and religious orientations towards the
sacred and profane, which comprise national, sociological, institutional, and religious features
respectively. Both value-based and faith-based practices and transactions make work culture of India
distinct.
Central to this chapter is the claim that, although it makes available a great deal of objective
information, electronic surveillance in the Indian organizational work context is unable to provide
unobtrusive control and these surveillances turn out to be highly costly and contested. Along with
quality management and performance attributes, in the Indian organizational context, power control
and power distance play a major role in the use of surveillance technologies. Poor constitutional and
legislative security over surveillance and individual rights of privacy fuels workplace bullying and
leads to employee mechanization and dehumanization, thus increasing the rate of both forced and
voluntary attrition.
Our analysis of surveillance in Indian call centres has (1) shown that treating surveillance as part of
management control strategy exhibits an ideological narrowness that even goes beyond the
Foucauldian notion of discipline; and (2) identified the danger that workers will become ‘cyborg’
workers, with consequent identity regulation and subjectivity alteration. Further analysis of the
implications of workplace surveillance will draw on the context of the Indian work cultural pattern
presented in this chapter. Our assessment will move toward a convergent and focused point
concerning quality of governance in the organizational workplace from two directions: (1) how
entrepreneurship could emerge as a new, predominant management style; and (2) how employee
behaviour and performance can be made more professional, ethical and dedicated.
CHAPTER THREE
WORKPLACE SURVEILLANCE AND PRIVACY: AN INDIVIDUAL RIGHTS
PERSPECTIVE
3.0 INTRODUCTION
The increased use of modern technology in the workplace has created new concerns for both
employers and employees in the area of privacy. Privacy is defined in a narrow sense, as the right
of the individual to determine the type and amount of information disclosed about themselves.1
Generally, privacy involves, but is not limited to, control over information about oneself and control
over who can observe or examine it by way of monitoring or scrutiny.2 For according to Ferdinand
Schoeman, “a person has privacy to the extent that others have limited access to information about
him, limited access to the intimacies of his life, or limited access to his thoughts or his body.”3
Considering today’s business world, this right to privacy is exposed in the workplace in an alarming
way, as a consequence of recent developments in technology and its subsequent privacy-invasive
implementation.4 Privacy in the workplace is under assault, and the organizational workplace in
particular has become the venue for a virtual panopticon, where the employee is made into a “naked
object of assessment”5 and control. The point of departure in this exploration will be a fuller depiction
of the contemporary understanding of the invasion of privacy in the workplace, concentrating on the
taxonomy of privacy.
This chapter considers a range of facts concerning privacy as a way to sharpen our ethical reflections.
It includes a conceptual analysis of privacy along with a wide-ranging investigation into the work of
its contemporary advocates and critics. The chapter is divided into four sections: first, we undertake
a conceptual analysis of privacy and its relation to and impact upon employee monitoring. We also
discuss the critiques and pro-privacy prospects identified by several contemporary scholars. The
second section will focus on a specific theme of investigation, namely electronic surveillance and
privacy in the workplace, followed by a brief analysis of the taxonomy of privacy in the third section.
The fourth section concludes the chapter by taking more of an ‘individual rights approach’ and
presenting an evaluation of the significance of employee privacy in the workplace.
3.1 CONCEPTUAL READING AND DEVELOPMENTS OF PRIVACY
The concept of privacy is more than ever relevant in today’s world, as it is more and more embraced
by the revolutionary advancement of information and communication technologies. It denotes a state
of being free from unwanted intrusion or disturbance in one’s life and affairs. Privacy may be
regarded as a value for individuals, for society, and for government, in connection respectively with
dignity, freedom, and good governance. The three aspects of privacy explained by Sara Baase are
1 Charles Fried, An Anatomy of Values: Problems of Personal and Social Choice (Cambridge: Harvard
University Press, 1970), 141. 2 Richard L. Lippke: “Work, Privacy, and Autonomy,” in Ethics in the Workplace, ed. Robert A. Larmer
(Minneapolis: West Publishing Company, 1996), 111. 3 Ferdinant D. Schoeman, Philosophical Dimensions of Privacy: An Anthology (Cambridge: Cambridge
University Press, 1984), 3. 4 Lisa Guerin, Smart Policies for Workplace Technologies: Email, Social Media, Cell Phones & More, 5th ed.
(Berkeley, CA: Nolo, 2017), 2. 5 Richard A. Spinello, John Gallaugher and Sandra Waddock, “Managing Workplace Privacy Responsibly,” in
Social, Ethical and Policy Implications of Information Technology, eds. Linda L Brennan and Victoria E.
Johnson, pp. 74-97 (Hershey: Information Science Publishing, 2004), 83. Originally in Matthew W. Finkin,
“Employee Privacy, American Values, and the Law,” Chicago-Kent Law Review 72 (1996): 267.
Workplace Surveillance and Privacy
94
freedom from intrusion (being left alone), freedom of control of information about oneself, and
freedom from surveillance (from being followed, tracked, watched, and eavesdropped).6 However,
these three aspects alone do not present a complete and comprehensive view. Joseph Kupfer writes
in this regard that “[p]rivacy contributes to the formation and persistence of autonomous individuals
by providing them with control over whether or not their physical and psychological existence
becomes part of another’s experience. Just this sort of control is necessary for them to think of
themselves as self-determining.”7 Thus the concept of privacy not only concerns one’s personal
information, but also applies to human behaviours and relations, the human body and activities, and
even one’s home and personal belongings. All these factors contribute to the importance of the
privacy in the workplace today. Therefore, scrutinizing what privacy means today requires that one
examine the many debates on this subject.
Etymologically, the term privacy derives from the Latin term privatus, which means ‘separated from
the rest.’8 Thus privacy is a state of being free from intrusion or disturbance in one’s private9 life or
affairs. Privatus in turn stems from privo, meaning ‘to deprive’. Privatus is also the participle of
privare, which means to set free. In Roman law, the Latin adjective privatus makes a legal distinction
between that which is “private and that which is publicus, public in the sense of pertaining to the
Roman people. The basic Latin form is the adjective privus, the original archaic meaning being
“single.” A standard later use of the same signifies that which is particular, peculiar, or one’s own –
the implied context being not the solitary human being but rather the individual facing the potential
claims of other persons.10 Privatus is also usually used in classical Latin to refer to a person who is
acting outside the bounds of political office, who has been freed or separated from office.11 Thus it
is all the more a herculean task to define privacy in a singular way, given its many and various
nuances in a contemporary world dominated by computers and information technologies. Arthur R.
Miller has already expressed this concern: as he states, “[t]he concept of privacy is difficult to define
because it is exasperatingly vague and evanescent, often meaning strikingly different things to
different people. In part this is because privacy is a notion that is emotional in its appeal and embraces
a multitude of different ‘rights’, some of which are intertwined, others often seemingly unrelated or
inconsistent.”12
The term privacy, however, is frequently used in different areas of scholarly discussions, such as in
philosophical, legal, and political contexts, as well as in ordinary language, including in social and
cultural reflections. Some scholars rarely use the term, stating that it is too vague. For instance,
6 Sara Baase, A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet, 3rd ed. (New
Jersey: Pearson Prentice Hall, 2009), 61. 7 Joseph Kupfer, “Privacy, Autonomy, and Self-Concept,” American Philosophical Quarterly 24 (1987): 81-
82. 8 J. A. Simpson and E.S.C. Weiner, “Privacy,” The Oxford English Dictionary XII (1989): 515. 9 The Greek word for private – idiotes (person lacking professional skill) – is the source of our term “idiotic.”
Ancient Greeks saw the private realm as a circumscribed realm that could never be a source of identity or
self-respect. Actions develop character by giving rise to praise and blame. Actions must occur in the public
realm where they are visible to other people who judge these deeds. Privacy as such became valued only in
the nineteenth century as people sought to protect themselves from attempts by the social body and corporate
institutions to press for conformity or to manipulate their identity. See, Daryl Koehn, “Ethical Issues in
Human Resources,” in The Blackwell Guide to Business Ethics, ed. Norman E. Bowie (Malden, MA:
Blackwell, 2002), 234. 10 Jack Hirshleifer, “Privacy: Its Origin, Function, and Future, Prepared for the Conference,” The Economics
and the Law of Privacy, University of Chicago, (1979): 3.
http://www.econ.ucla.edu/workingpapers/wp166.pdf [accessed November 28, 2012]. 11 “Privatus,” http://www.textkit.com/greek-latin-forum/viewtopic.php?t=11280&p=83694 [accessed
November 15, 2012]. 12 Arthur R. Miller, The Assault on Privacy (Michigan: The University of Michigan Press, 1971), 25.
Workplace Surveillance and Privacy
95
Robert C. Post, at the beginning of his article ‘Three Concepts of Privacy,’ states that “privacy is a
value so complex, so entangled in competing and contradictory dimensions, so engorged with various
and distinct meanings that I sometimes despair whether it can be usefully addressed at all.”13 Before
we can achieve a clear understanding of the issues at stake in workplace monitoring, then, it is
essential that we have an precise concept of privacy. Traditionally, privacy has been conceived either
by attempting to identify its essence or by identifying the core characteristics that link together
various things referred to by the term.14 In doing this, one can neither narrow down its extensiveness
and depth-dimension by excluding things commonly known to be private, nor make it too broad,
since some things we would consider intrusions we may not consider violations of privacy. In like
manner, Julie Inness writes that “the content of privacy cannot be captured if we focus exclusively
on either information, access, or intimate decisions because privacy involves all three areas.”15 All
these facts make clear the complexity in addressing the issues at stake.
The concept of privacy is in such disarray, Daniel Solove writes, that nobody can articulate fully
what it means.16 Privacy, for Solove “is a sweeping concept, encompassing (among other things)
freedom of thought, control over one’s body, solitude in one’s home, control over personal
information, freedom from surveillance, protection of one’s reputation, and protection from searches
and interrogations.”17 Solove expresses here the difficulty of explaining what privacy means as the
essence and scope of this right are wide and complex. It is because for him the conceptualization of
privacy involves both defining and articulating its value.18 Even though privacy is recognized as “an
essential issue for freedom and democracy,” he writes, “widespread discontent over conceptualizing
privacy persists” and since problems of privacy have been given only a limited articulation, “we
frequently lack a compelling account of what is at stake when privacy is threatened and what
precisely the law must do to solve these problems.”19 To properly conceptualize privacy one must
have an adequate understanding of the notion of privacy in any context. Based on this background,
Solove explains that privacy is “a fundamental right, essential for freedom, democracy, psychological
well-being, individuality, and creativity.”20 This will be further explored in the following section.
Privacy, therefore, is a special kind of independence, securing autonomy in one’s personal life
concerns even in defiance of all the pressures of culture and society.21 The complexity of the
contemporary world constantly causes difficulties for the privacy of the individual and of society as
a whole. Being as we are in an unprecedented information age, the definition of privacy can be stated
as the ability of an individual to prevent information pertaining to himself or herself from becoming
known to people other than those they choose to give the information to, and to limit and restrict
physical or bodily access unless the person himself or herself desires to grant such access. However,
privacy is something people don’t think much about until it is lost or breached. This is what precisely
happening because of evolutions in biometric technologies, video surveillance, online privacy,
workplace monitoring, data profiling, financial privacy, medical privacy, genetic privacy,
behavioural targeting, and religious and spiritual beliefs and practices. Thus, there are several
13 Robert C. Post, “Three Concepts of Privacy,” The Georgetown Law Journal 89 (2001): 2087. 14 Daniel J. Solove, “I’ve Got Nothing to Hide and Other Misunderstandings of Privacy,” San Diego Law
Review 44 (2007): 754. 15 Julie Innes, Privacy, Intimacy, and Isolation (Oxford: Oxford University Press, 1992), 56. 16 Daniel J. Solove, Understanding Privacy (Cambridge: Harvard University Press, 2009), 1. 17 Solove, Understanding Privacy, 1. 18 Daniel J. Solove and Paul M. Schwartz, Information Privacy Law, 6th ed. (New York: Wolters Kluwer,
2018), 43-45. 19 Solove, Understanding Privacy, 2. 20 Solove, Understanding Privacy, 5. 21 Miller, The Assault on Privacy, 24.
Workplace Surveillance and Privacy
96
different and nuanced ways of interpreting of privacy, which can be summarized under three
perspectives.
3.1.1 Legalistic, Individualistic and Pluralistic Perspectives on Privacy
The right to privacy concerns all spheres of modern life and is recognized as a fundamental human
right in many countries. Privacy was first legally defined as a right in 1890 by the American Justices
Samuel Warren and Louis Brandeis,22 who stated that privacy is “the right to be let alone.”23 This
could be the first categorical description of privacy, which in my own view is not polemic but
explication. Warren and Brandeis tried also to connect the right to privacy to one’s thoughts and
emotions, and pointed to a “principle of ‘inviolate personality’ which was part of a general right of
immunity of the person, ‘the right to one’s personality’ [...and recognized] this protection under the
name of privacy.”24 For them, the public dissemination of the details of private life constitutes an
invasion of privacy. They tried to define the boundary between personal and public space and
opposed unsanctioned intrusion of any kind.25 The privacy rights of individuals are protected and
preserved either by the constitution of a country or by the declaration of various acts and laws
promulgated for this purpose.
The Universal Declaration of Human Rights, article 12, states that “[N]o one shall be subjected to
arbitrary interference with his privacy, family, home or correspondence, or to attacks upon his honour
and reputation. Everyone has the right to the protection of the law against such interference or
attacks.”26 In 1965, a quite different right to privacy, independent of informational privacy and the
22 Dorothy J. Glancy argues that Warren and Brandeis did not even coin the phrase, “right to privacy,” nor its
common soubriquet, “the right to be let alone.” Indeed, much of the force of their argument for legal
recognition and enforcement of the right to privacy derives from their ingenious evocation of a broad
historical sweep in which such legal recognition and enforcement appears as a natural and inevitable
development. All that Warren and Brandeis ever claimed to have developed was a legal theory which brought
into focus a common “right to privacy” denominator already present in a wide variety of legal concepts and
precedents from many different areas of the common law. Their original concept of the right to privacy thus
embodied a psychological insight, at that time relatively unexplored, that an individual’s personality, and
especially his or her self-image, can be affected, and sometimes distorted or injured, when information about
that individual’s private life is made available to others. In simplest terms, for Warren and Brandeis the right
to privacy was the right of each individual to protect his or her psychological integrity by exercising control
over information which both reflected and affected that individual’s personality. Dorothy J Glancy, “The
Invention of the Right to Privacy,” Arizona Law Review 21 (1979): 2-3. 23Samuel Warren and Louis Brandeis, “The Right to Privacy,” Harvard Law Review 4 (1890): 193-220.
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html [accessed February
18, 2014]. After Warren and Brandeis, authors like Daniel Solove uses the term ‘let alone’ while few authors
like Patricia Werhane and Sara Baase, however, use the concept ‘left alone’ to mean the same. Cf. Daniel J.
Solove, Understanding Privacy (Cambridge: Harvard University Press, 2009), 12-13; Patricia Werhane,
Persons, Rights, and Corporations (New Jersey: Prentice-Hall, 1985), 118; Sara Baase, A Gift of Fire: Social,
Legal, and Ethical Issues for Computing and the Internet, 3rd ed. (New Jersey: Pearson Prentice Hall, 2009),
61. 24 Sylvia Kierkegaard, “Privacy in Electronic Communication Watch your e-mail: Your Boss is Snooping,”
Computer Law & Security Report 21 (2005): 227. See also, Warren and Brandeis, “The Right to Privacy,”
193-220. 25 Kierkegaard, “Privacy in Electronic Communication Watch your e-mail,” 227. 26 “The Universal Declaration of Human Rights (UDHR),” Donegall Pass Community Forum, (2006).
http://donegallpass.org/UNIVERSAL_DECLARATION_OF_HUMAN_RIGHTS.pdf [accessed February 8,
2014]. The Universal Declaration of Human Rights (UDHR) is a declaration adopted by the United Nations
General Assembly on 10 December 1948 at the Palais de Chaillot in Paris. The Declaration arose directly
from the experience of the Second World War and represents the first global expression of rights to which all
human beings are inherently entitled. It consists of 30 articles which have been elaborated in subsequent
international treaties, regional human rights instruments, national constitutions and laws.
Workplace Surveillance and Privacy
97
Fourth Amendment, was recognized explicitly by the Supreme Court in the USA.27 It is now
commonly called the constitutional right to privacy.28 Though the right to privacy was not clearly
defined here, it has generally been viewed as a right to the protection of one’s individual interest and
of one’s free choice to take certain vital and personal decisions about one's family, life and lifestyle.29
The European Treaty30, containing the charter of the rights of the European citizens, also places great
emphasis on the right to privacy. The European Convention on Human Rights31 guarantees the right
to privacy for all Europeans. Article 8, 1 of ECHR states that “[E]veryone has the right to respect for
his private and family life, his home and his correspondence.”32 This is further stressed in paragraph
2, which states,
[T]here shall be no interference by a public authority with the exercise of this right except such as
is in accordance with the law and is necessary in a democratic society in the interests of national
security, public safety or the economic well-being of the country, for the prevention of disorder
or crime, for the protection of health or morals, or for the protection of the rights and freedoms of
others.33
Recognizing the challenges that technological developments and globalization pose for the
protection of personal data, the recent General Data Protection Regulation (GDPR) of European
Union states that “the protection of natural persons in relation to the processing of personal data is a
27 Solove and Schwartz, Privacy Law Fundamentals, 67. 28 The right was first announced in the Griswold v. Connecticut (381 U.S. 479) case, which overturned
convictions of the Director of Planned Parenthood and a doctor at Yale Medical School for dispersing
contraceptive related information, instruction, and medical advice to married persons. The constitutional right
to privacy was described by Justice William O. Douglas as protecting a zone of privacy covering the social
institution of marriage and the sexual relations of married persons. Despite controversy over Douglas' opinion,
the constitutional privacy right was soon cited to overturn a ban against interracial marriage, to allow
individuals to possess obscene matter in their own homes, and to allow distribution of contraceptive devices
to individuals, both married and single. The most famous application of this right to privacy was as one
justification of abortion rights defended in 1973 in Roe v. Wade (410 U.S. 113) and subsequent decisions on
abortion. Here the concern was about the marriage and the sexual relations of married persons. The most
famous application of this right to privacy was as one justification of abortion rights defended in 1973. 29 DeCew, “Privacy,” Stanford Encyclopedia of Philosophy, August 9, 2013 (first published: May 14, 2002),
http://plato.stanford.edu/entries/privacy/ [accessed February 8, 2014]. 30 European Treaty is a binding agreement between the member countries of European Union that places the
rules and regulations of the decision making and the relationship in and between its members. According to
the preamble of its charter of fundamental rights of the European Union “Conscious of its spiritual and moral
heritage, the Union is founded on the indivisible, universal values of human dignity, freedom, equality and
solidarity [...]. It places the individual at the heart of its activities, by establishing the citizenship of the Union
and by creating an area of freedom, security and justice.” These rights enshrined in the treaty are privilege of
all European citizens. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2007:303:0001:0016:EN:PDF [accessed
October 14, 2016]. 31 The European Convention on Human Rights (ECHR) (formally the Convention for the Protection of Human
Rights and Fundamental Freedoms) is an international treaty to protect human rights and
fundamental freedoms in Europe Drafted in 1950 by the then newly formed Council of Europe, the
convention entered into force on 3 September 1953. All Council of Europe member states are party to the
Convention and new members are expected to ratify the convention at the earliest opportunity. Privacy right
for all individual is guaranteed here. http://www.echr.coe.int/NR/rdonlyres/D5CC24A7-DC13-4318-B457-
5C9014916D7A/0/Convention_ENG.pdf [accessed October 14, 2016]. 32 “European Convention on Human Rights and its Five Protocols,” European Convention on Human Rights,
Section 1, Article 8, 1 & 2. http://www.globaldetentionproject.org/fileadmin/docs/European-Convention-on-
Human-Rights.pdf. [accessed October 14, 2016]. 33 “European Convention on Human Rights and its Five Protocols,” Section 1, Article 8, 1 & 2.
http://www.hri.org/docs/ECHR50.html [accessed October 14, 2016].
Workplace Surveillance and Privacy
98
fundamental right” (Article 1).34 It urges that personal data processing serve mankind, and thus that
this right be considered in relation to its function in society and be balanced against other fundamental
rights. Further discussion on GDPR and data privacy will be added in the later sections of this
chapter.
Considering the Indian context, Article 21 of the Indian Constitution, entitled protection of Life and
Personal Liberty, states that “[N]o person shall be deprived of his life or personal liberty except
according to procedure established by law.”35 It assures the right to privacy and right to live with
human dignity, free from exploitation and intrusion by others. It shows that the right to privacy may
be considered a ‘penumbra right,’ a right guaranteed by implication in the constitution.36 Within the
scope of this research, we will briefly analyse the Indian legal position on employee privacy as a
guaranteed fundamental human right. The 1994 elaboration of the right to privacy of the Supreme
Court in R. Rajagopal vs. State of Tamil Nadu, involving the balancing of the right of citizens against
the right of the press to criticise, fully expresses the mind of the Indian judiciary: “The right to privacy
is implicit in the right to life and liberty guaranteed to the citizens of this country by Article 21. It is
a ‘right to be let alone.’ A citizen has a right to safeguard the privacy of his own [...].”37 Although
Indian labour legislation in particular contains no provision with respect to employee privacy, the
right to privacy has been recognized under the above mentioned article (21) of Indian constitution
by the Supreme Court of India in the case of Kharak Sing v State of UP, AIR 1963 SC 1295 and
People’s Union of Civil Liberties v the Union of India (1997) 1 SCC 318, where it has been treated
as a subset of the larger right to life and personal liberty.38
Next to this is the case of PUCL v. Union of India (1997) over the issue of wiretapping, in which the
Supreme Court went on to hold that:
[T]he right to hold a telephone conversation in the privacy of one’s home or office without
interference can certainly be claimed as right to privacy [and] conversations on the telephone are
often of an intimate and confidential character [...]. Telephone conversation is an important facet
of a man's private life. Right to privacy would certainly include telephone-conversation in the
privacy of one's home or office. Telephone-tapping would, thus, infract Article 21 of the
Constitution of India unless it is permitted under the procedure established by law.39
This case, in fact, made prior judicial scrutiny mandatory before any wiretapping can be carried out,
and prescribed a clear list of procedural guidelines to follow.40 Another famous verdict and
description on privacy by the Delhi High Court is illustrated in Naz Foundation v. Government of
NCT of Delhi WP(C) No.7455/2001, which states that “the right to privacy thus has been held to
protect a ‘private space in which man may become and remain himself’. The ability to do so is
34 European Parliament, “General Data Protection Regulation,” Official Journal of the European Union, May
5, 2016. http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679 [accessed May 28,
2018]. The GDPR pursues to form a harmonised data protection law framework across the EU. It aims to give
the control of the personal data to data subjects and imposes strict rules and regulations on those hosting and
processing this data. 35Vidhan Maheshwari, “Article 21 of the Constitution of India – The Expanding Horizons,”
http://www.legalserviceindia.com/articles/art222.htm [accessed October 14, 2016]. 36 Prashant Iyengar, Privacy in India - Country Report - October 2011, October 30, 2011, 5. http://cis-
india.org/internet-governance/country-report.pdf [accessed September 25, 2016]. 37 Iyengar, Privacy in India - Country Report - October 2011, 9. 38 Rakhi Jindal, Gowree Gokhale and Vikram Shroff, “The Indian Legal Position on Employee Data Protection
and Employee Privacy,” Employment & Industrial Relations Law (2012): 47. 39 Iyengar, Privacy in India - Country Report - October 2011, 10. 40 Iyengar, Privacy in India - Country Report - October 2011, 10-11.
Workplace Surveillance and Privacy
99
exercised in accordance with individual autonomy.”41 The constitutionally guaranteed right to liberty
and right to freedom of speech is broadly interpreted here, and it is a right to get on with one’s life
and personality.
Similarly, the Information Technology Act of 2000 (IT Act) addresses, though in very minimal way,
issues related to data protection and privacy under its sections 43A, which provides for the protection
of sensitive personal data or information, and 72A, which protects the same from unlawful disclosure
in breach of contract.42 This Act deals with online/computer related privacy issues such as “hacking
(Secs 43 & 66), [...] electronic voyeurism (Sec 66E), phishing and identity theft (66C/66D), offensive
email (Sec. 66A),” etc.43 The right to privacy is expressed in a limited way in Indian legislation, in
this regard, not in an absolute way. In the same way, this Act amended in 2008 under section 43
“obliges corporate bodies who ‘possess, deal or handle’ any ‘sensitive personal data’ to implement
and maintain ‘reasonable security practices,’ failing which, they would be liable to compensate those
affected by any negligence attributable for this failure.”44 Moreover, the data protection liability for
‘body-corporates’45 under Section 43A of the IT Act and the subsequent Reasonable Security
Practices Rules 2011 introduce a mandatory data protection regime for organizational workplaces,
which also shows concern about the protection of the sensitive personal information in the workplace
and provides mandatory privacy policies for body-corporates.46
Correspondingly, Rule 4 of the Reasonable Security Practices Rules of 2011 “[enjoin] a body
corporate or its representative who collects, receives, possesses, stores, deals or handles data to
provide a privacy policy for handling of or dealing in user information including sensitive personal
information.”47 It calls for details of the type of information collected, its purpose, means and modes
of usage, and the manner of its disclosure.48 Moreover, India is a signatory to the International
Covenant on Civil and Political Rights (ICCPR)49 and thus upholds the right to privacy affirmed
there in article 17, which states that, “no one shall be subjected to arbitrary or unlawful interference
with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and
reputation. Everyone has the right to the protection of the law against such interference or attacks.”50
However, recognizing the growing issues of privacy violations due to the absence of a comprehensive
and solid law to safeguard workplace privacy in India,51 the government is now drafting legislation
to protect individual privacy breached through unlawful means. The groups supporting this privacy
bill recommend that “the new legislation should protect all types of privacy, such as bodily privacy
41 Ajit Prakash Shah, “Naz Foundation vs Government of NCT of Delhi and Others WP(C) NO.7455/2001,”
High Court of Delhi, July 2, 2009. https://indiankanoon.org/doc/100472805/ [accessed September 25, 2016]. 42 Jindal, Gokhale and Shroff, “The Indian Legal Position on Employee Data Protection and Employee
Privacy,” 47. 43 Iyengar, Privacy in India - Country Report - October 2011, 12. 44 Iyengar, Privacy in India - Country Report - October 2011, 13. 45 A body corporate is defined as a person, association, or group of persons legally incorporated. It is nothing
but a corporation itself. In other words, it is a legal entity or a corporate entity - an association, company, or
institution - identified by a particular name that has its own legal rights and responsibilities. 46 Iyengar, Privacy in India - Country Report - October 2011, 14. 47 Iyengar, Privacy in India - Country Report - October 2011, 15. 48 Iyengar, Privacy in India - Country Report - October 2011, 15. 49 The International Covenant on Civil and Political Rights (ICCPR) is a multilateral treaty signed by the United
nations General Assembly and in force from 1976. The respect of civil and political rights of individual is
given paramount importance here. 50 “International Covenant on Civil and Political Rights,” United Nations Human Right, Adopted and opened
for signature, ratification and accession by General Assembly resolution 2200A (XXI) of 16 December 1966
entry into force 23 March 1976. http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx [accessed
September 25, 2016]. 51 Iyengar, Privacy in India - Country Report - October 2011, 112.
Workplace Surveillance and Privacy
100
(DNA and physical privacy); privacy against surveillance (unauthorised interception, audio and
video surveillance); and data protection.”52 However, a comprehensive privacy policy or bill has not
yet been published by the Indian government and is still in the drafting process. Recommendations
from the Planning Commission of India for comprehensive privacy legislation will be discussed in
the later part of this chapter.
Generally, to understand the notion of the right to privacy better, Patricia Werhane has proposed that
this right includes (1) the right to be left alone, (2) the related right to autonomy, and (3) “the claim
of individuals, groups, or institutions to determine for themselves when, how, and to what extent
information about them is communicated to others.”53 Thus privacy as a right actually creates a
private sphere into which one can retreat to escape from unwanted observation, exposure, or
publicity. And this in fact fosters the right use of one’s own freedom and creativity and right functions
in life. Reflecting upon workplace privacy, Werhane writes that “unless privacy is respected persons
lose a sense of self identity and without privacy, one’s personal freedom is, at best, restricted, and
one’s autonomy is not safeguarded.”54 A right to privacy protects personal freedom and autonomy
by keeping personal information in the hands of its rightful owner. Moreover, respect for privacy
prevents the misuse of personal information, guarantees freedom of thought and expression, and
enables the creative use of one’s skills for self-actualization and eventually better job situation, to
the benefit of the owner. Werhane’s idea could be better summarized by noting that privacy, as a
fundamental right, consists of the claim that “as a rational adult one has the right to autonomy: the
right to make choices and to direct one’s own life so long as these choices do not affect the freedom
of others. If one has the right to choose for oneself, one also has the right to protect oneself from
outside interference. If personhood is individual, I have a right to isolate myself from the invasion of
others.”55 The following section will continue our analysis of these various perspectives on privacy.
Ruth Gavison describes privacy as a condition of life that has to be protected by law rather than an
individual issue based on choice.56 In the same way, a structuralistic understanding of privacy defines
it as “a specific social structure, a moral or legal right, which is used to enable someone’s ability to
limit or restrict others from access to persons or information” and assumes that privacy includes
freedom from unwarranted intrusion and should be protected.57 This understanding in fact paves the
way for the view that more privacy can be attained when one keeps one’s information more secret.
Nevertheless, a structuralistic understanding of privacy often underestimates the role of individual
control and choice, because an individual can also limit or restrict the flow of personal information.58
Yet the structuralistic understanding of privacy, as a restricted access definition, assumes that privacy
is a moral right which is to be protected and includes freedom from unwarranted intrusion.59 The
individual approach, on the contrary, by giving more importance to the individual, understands
privacy to mean that one has control over information about oneself or an ability to maintain one’s
information either by way of its acquisition or release.60 Froomkin notes that privacy “encompasses
ideas of bodily and social autonomy, of self-determination, and of the ability to create zones of
52 Hars Imran, “Are We Closer to a Law on Privacy?” The PRS Blog, October 19, 2012,
http://www.prsindia.org/theprsblog/?tag=right-to-privacy [accessed October 10, 2016]. 53 Patricia Werhane, Persons, Rights, and Corporations (New Jersey: Prentice-Hall, 1985), 118. 54 Werhane, Persons, Rights, and Corporations, 118. 55 Werhane, Persons, Rights, and Corporations, 117-118. 56 Ruth E. Gavison, “Privacy and the Limits of Law,” Yale Law Journal 89, no. 3 (1980): 425. 57 Thomas Allmer, “A Critical Contribution to Theoretical Foundations of Privacy Studies,” Journal of
Information, Communication and Ethics in Society 9, no. 2 (2011): 87. 58 Herman T. Tavani, “Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy,”
Metaphilosophy 38, no. 1 (2007): 9. 59 Allmer, “A Critical Contribution to Theoretical Foundations of Privacy Studies,” 85. 60 Allmer, “A Critical Contribution to Theoretical Foundations of Privacy Studies,” 88.
Workplace Surveillance and Privacy
101
intimacy and inclusion that define and shape our relationship with each other.”61 Hence, from an
individualistic perspective, privacy is understood as the ability to exert individual control over one’s
personal information by the individual him or herself. In this manner, it is held that:
Privacy is a personal interest, or/and privacy includes the freedom from external interference in
one’s personal choices, and plans, or/and the degree of personal choice indicates how much
privacy an individual has, or/and restrictions of privacy are losses, or/and privacy should be
defined in a descriptive way, or/and full privacy is reached as long as the individual is able to
choose which personalities should be disclosed.62
However, just as in traditional liberalism, if privacy is seen as a value or right possessed by
individuals alone, the premises of individualism may lead one to the extremist position that the exists
only to promote the worth and dignity of the individual, and thus that the right to privacy is nothing
but a right not to participate in collective or societal life, something like the right to shut out the
community.63 Thus the term privacy, explained thus exclusively in individualistic terms, may lead
one to underestimate its predominance in human life. This shows that the individualist view on
privacy often underestimates the constraining effects of social structures that may, in turn, restrict
individual control over information.64 Privacy is not an external constraint, however, but an internal
dimension of society that protects individuals based upon the norms of the society.65 This includes
an integrative perspective on privacy which combines both individualistic and structuralistic notions
and regards privacy as a right to be protected and a kind of individual control.66 Hence the
individualist perspective both recognizes that social structures often restrict individual control over
information, and considers the role of individual control and choice. Integrative notions thus show
that, although full control over personal information cannot be maintained, individuals can to a
certain extent limit or restrict access to this information and thus hope to avoid the pitfalls of both
individualism and structuralism.67
Solove also proposes a pluralistic understanding of privacy, stating that privacy is not reducible to a
singular essence since it functions as a plurality of different things.68 A restrictive and narrow
conceptual understanding of privacy leads one to overlook the harm privacy can cause. It does not
have any single, core element but rather exhibits many natures, all related to each other.69 This
observation is the basis for a pluralistic understanding of privacy that even includes confidentiality,
data security, and the regulation of information flow. Solove’s extensive analysis of scholarly and
judicial writings on privacy leads him to classify notions of privacy into six general types, each of
which, though they often overlap, offers a distinctive perspective on privacy. These six types are the
following:
(1) the right to be let alone – formulation on the right to privacy by Warren and Brandeis;
(2) limited access to the self – freed from unwanted access by others;
(3) secrecy – certain matters are concealed from others;
(4) control over personal information;
61 A. Michael Froomkin, “The Death of Privacy?” Stanford Law Review 52, no. 5 (2000): 1466. 62 Allmer, “A Critical Contribution to Theoretical Foundations of Privacy Studies,” 88. 63 Thomas I. Emerson, The System of Freedom of Expression (New York: Vintage Books, 1970), 545-549. 64 Tavani, “Philosophical Theories of Privacy,” 9. 65 Robert C. Post, “The Social Foundations of Privacy: Community and Self in the Common Law Tort,”
California Law Review 77, no. 5 (1989): 968. 66 Allmer, “A Critical Contribution to Theoretical Foundations of Privacy Studies,” 92. 67 Allmer, “A Critical Contribution to Theoretical Foundations of Privacy Studies,” 92. 68 Daniel J. Solove, Understanding Privacy (Cambridge: Harvard University Press, 2009), 98-100. 69 Solove, “I’ve Got Nothing to Hide,” 756.
Workplace Surveillance and Privacy
102
(5) personhood – protection of individuality and dignity; and
(6) intimacy – control over or limited access to one’s intimate relationships or aspects of life.70
Hence, Solove calls privacy a concept in disarray, as already noted, that in fact consists of many
different yet interrelated things. In fact, Solove’s approach to privacy has four dimensions, namely:
(1) a method that abandons the traditional way of conceptualizing privacy and looks for a common
pool of similar elements; (2) a degree of generality that conceptualizes privacy from the bottom up
and in relation to particular contexts; (3) a variability that looks for lasting or widespread usefulness
while avoiding being too variable and contingent; and (4) a focus that unravels the complexities of
privacy in a consistent manner.71 A clear pluralistic conception of privacy will be relevant in multiple
contexts yet not tied to any one specific context. That means that privacy is not about anyone thing,
but rather about many distinct and often interrelated things. A myopic and too-narrow perception of
privacy fails to recognize its plural nature and the issues and problems that consequently arise from
it.
Additionally, though it is difficult to assign an overarching value of privacy, as Solove puts it, valuing
privacy protects many other things as well: intimacy, dignity, individuality, autonomy, freedom,
independence, psychological well-being, and so forth.72 In this way, more than merely a unitary
value, privacy consists of a plurality of protections in various activities in different contexts. In
agreement with what has been said, therefore, “we must value privacy on the basis of the range of
activities it protects beyond the specific activities involved in the situation.”73 Therefore, for Solove,
there is no common denominator to properly conceptualize privacy. For the broad denominator will
risk being over-inclusive or too vague, while the narrow denominator may be too restrictive.74
Privacy is also a product of diverse norms and activities which are culturally contingent. However,
since the notion of privacy is not fully conceptualized in a uniform way and confusion remains
concerning its meaning, value and scope, one can argue that there is nothing special about privacy
and that its promulgation makes no distinct claim other than the claim to be a moral value. These
explorations invite us to consider critical accounts of privacy, analysing different perspectives: we
will consider the “nothing to hide” argument, the reductionist observation, economic and legal
criticisms, and others.
3.1.2 Critiques of Privacy Arguments
There are quite different sceptical and critical accounts of privacy. Scholars who decline to interpret
privacy as a single concept, refer to a diversity of values at stake and relate it to other social and
cultural issues that overlap with privacy interests. These scholars are reluctant to accept that there is
something coherent and distinctive about privacy claims.75 For instance, Collin J. Bennett writes
that, “privacy and all that it entails is argued to be too narrow, too based on liberal assumptions about
subjectivity, too implicated in rights-based theory and discourse, insufficiently sensitive to the social
sorting and discriminatory aspects of surveillance, culturally relative, overly embroiled in spatial
metaphors about ‘invasion’ and ‘intrusion’, and ultimately practically ineffective.”76 In the same
70 Solove, Understanding Privacy, 12-13. 71 Solove, Understanding Privacy, 9. 72 Solove, Understanding Privacy, 98. 73 Solove, Understanding Privacy, 99. 74 Solove, Understanding Privacy, 9. 75 Ferninand Schoeman, ed., Philosophical Dimensions of Privacy: An Anthology (Cambridge: Cambridge
University Press, 1984), 5. 76 Colin J. Bennett, “In Defence of Privacy: The Concept and the Regime,” Surveillance & Society 8, no. 4
(2011):485. Cf. Kaupins and Coco, “Perceptions of Internet-of-Things Surveillance by Human Resource
Managers,” 54.
Workplace Surveillance and Privacy
103
way, critics of privacy argue that it may be used to conceal deception, hypocrisy, and wrongdoing,
thus enabling fraud and protecting the guilty. This section analyses major criticisms levelled against
the protection of privacy.
First, we evaluate the “nothing to hide” argument. Discussion of privacy issues is often discouraged
on the premise that no privacy problems exists so long as a person has nothing to hide. According to
the “nothing to hide” argument, “there is no threat to privacy unless the government uncovers
unlawful activity, in which case a person has no legitimate justification to claim that it remains
private.”77 Data mining and surveillance programmes thus do not threaten privacy, presuming that
one has nothing to hide. Moreover, Solove observes that the nothing to hide argument is highly
compelled by of the tension between privacy concerns and the sensitive interests of security
promotion.78 This situation calls for a cost-benefit analysis related to security. Adam D. Moore argues
that “in essence, it is the view that rights are resistant to cost/benefit or consequentialist sort of
arguments [and] here we are rejecting the view that privacy interests are the sorts of things that can
be traded for security.”79 The reasoning of the nothing to hide argument, as Solove frames it, is that
“when it comes to government surveillance or use of personal data, there is no privacy violation if a
person has nothing sensitive, embarrassing, or illegal to conceal.”80 The problem with this argument,
for Solove, lies in its underlying assumption that privacy is about hiding bad things, because it views
only privacy as a form of concealment or secrecy. Therefore, Solove argues that to understand
privacy, we must first conceptualize it and its attendant values more pluralistically.81 The simple
reasoning is that the term privacy denotes many factors relating to the physical, psychological and
informational scenarios of one’s life.
Secondly, reductionists often argue that privacy can be reduced to other conceptions and rights.
Judith Thomson, basing her argument on a conception of the multifaceted and unresolved disunity
of claims to privacy, holds that the various alleged invasions of privacy are adequately well explained
as violations of property rights or other personal rights.82 For her, privacy is merely a cluster of rights
that overlap with and can always be fully explained by property rights or rights to bodily security.
Thomson writes that “the right to privacy is itself a cluster of rights [...] that it is not a distinct cluster
of rights but itself intersects with the cluster of rights which the right over the person consists in and
also with the cluster of rights which owning property consists in.”83 Since any privacy violation could
be understood as the violation of a more basic right, such as the right to property, Thomson suggests
that it is better perceived as merely derivative in its importance and justification and merely imitative,
due to its alleged lack of originality and uniqueness.84 However, Julie Innes opines that our interest
in privacy cannot be reduced to other interests. She correctly accords a positive normative value to
privacy, holding that it provides the agent with control over intimate decisions, and consists of
intimate reflections and actions.85 Hence, Innes defines privacy as “the state of possessing control
77 Emilo Mordini, “Nothing to Hide: Biometrics, Privacy and Private Sphere,” in Ben Schouten et al., eds.,
Biometrics and Identity Management: First Eurpean Workshop, BIOID 2008 (Denmark: Springer, 2008),
252. 78 Daniel J. Solove, “I’ve Got Nothing to Hide and Other Misunderstanding of Privacy,” San Diego Law Review
44 (2007): 752. 79 Adam D. Moore, Privacy Rights (Pennsylvania: The Penn State University Press, 2010), 204. 80 Solove, “I’ve Got Nothing to Hide,” 764. 81 Solove, “I’ve Got Nothing to Hide,” 764. 82 Judith Jarvis Thomson, “The Right to Privacy,” Philosophy and Public Affairs 4 (1975): 304-305. 83 Thomson, “The Right to Privacy,” 306. 84 Thomson, “The Right to Privacy,” 313. 85 Julie Innes, Privacy, Intimacy, and Isolation (Oxford: Oxford University Press, 1992), viii.
Workplace Surveillance and Privacy
104
over decisions concerning matters that draw their meaning and value from an agent’s love, liking, or
care.”86
Thirdly, the concept of privacy has been criticised from economic and legal perspectives. Robert
Bork uses a legal framework to defend the constitutional right to privacy to criticise the very idea of
privacy, whereas Richard Posner develops a unique critical account, arguing that privacy is protected
in ways that are economically inefficient.87 Analysing the constitutional right to privacy established
in Griswold v. Connecticut by the Supreme Court of the United States in 1965,88 Bork contends that
the right to privacy is not derived from any pre-existing right or from the natural law, but has merely
been created as a new right (the right to privacy) with no foundation in the Constitution or the Bill
of Rights.89 In fact, as is obvious, the term privacy does not appear in these documents. However,
the amendments to these documents do give us some valid ways to argue that it is implied there. For
example, the right of privacy, though not explicitly stated in the Bill of Rights, is a substantive right
of the people stemming from the Due Process Clause of the Fifth Amendment.90 A similar
understanding is found in Bork’s criticism that courts never articulated or clarified what exactly this
right is and how far it is to be extended.
According to Judith Thomson, the constitutional right to privacy is more suitably articulated as a
right to liberty, not to privacy.91 As opposed to it, Julie Innes affirms the historical and conceptually
coherent notion of privacy as distinct from any other conception, such as liberty, property rights,
etc.92 Richard Posner, on the other hand, holds that “common law is best explained as if the judges
were trying to maximize economic welfare”93 and an optimal public policy would not stress personal
privacy. Posner defends the significance of organizational or corporate privacy over personal
privacy, because the former is likely to enhance the economy.94 Hence, the element of privacy, as
control over information about oneself, reveals the concealment or selective disclosure of
information. This, for Posner, often misleads and manipulates people and inhibits economic growth.95
86 Innes, Privacy, Intimacy, and Isolation, viii. 87 These differences could be traced by a critical and open-minded scrutiny of the works of both Bork and
Posner. See Robert Bork, The Tempting of America: The Political Seduction of the Law (New York: Pantheon,
(1990), and Richard Posner, The Economics of Justice (Cambridge: Harvard University Press, (1981). 88 The right was first announced in Griswold v. Connecticut (381 U.S. 479) case, which overturned the
convictions of the Director of Planned Parenthood and a doctor at Yale Medical School for dispersing
contraceptive related information, instruction, and medical advice to married persons. The constitutional right
to privacy was described by Justice William O. Douglas as protecting a zone of privacy covering the social
institution of marriage and the sexual relations of married persons. Despite controversy over Douglas' opinion,
the constitutional right to privacy was soon cited to overturn a ban against interracial marriage, to allow
individuals to possess obscene matter in their own homes, and to allow distribution of contraceptive devices
to individuals, both married and single. The most famous application of this right to privacy was to the matter
of abortion rights, as defended in 1973 in Roe v. Wade (410 U.S. 113) and subsequent decisions on abortion.
Here the concern was about the marriage and the sexual relations of married persons. 89 Bork, The Tempting of America, 95-100. 90 The 5th Amendment states, “nor shall any person be subject for the same offense to be twice guarantees due
process from the federal government, stating no person shall “be deprived of life, liberty, or property, without
due process of law.” The states are required to provide due process because the 14th Amendment states, “Nor
shall any state deprive any person of life, liberty, or property, without due process of law.” See “Fifth
Amendment: An Overview,” http://www.law.cornell.edu/wex/fifth_amendment [accessed February 5,
2014]. 91 Thomson, “The Right to Privacy,” 305. 92 Innes, Privacy, Intimacy, and Isolation, viii. 93 Posner, The Economics of Justice, 4. 94 Posner, The Economics of Justice, 232-252. 95 Posner, The Economics of Justice, 282-286.
Workplace Surveillance and Privacy
105
Therefore, privacy domains should be thrown away to promote transparency among people, which
in turn has economic benefits.
Fourthly, Fred Cate, a legal scholar, interprets privacy as an antisocial construct because it conflicts
with other important social values, such as free expression, the prevention and punishment of crime,
the protection of private property, and the function of government operations.96 Solove, however,
claims that although privacy is “proclaimed inviolable but decried [often] as detrimental, antisocial,
and even pathological, it seems, as though everybody is talking about privacy, it is not clear exactly
what they are talking about.”97 Therefore, we need a more comprehensive assessment of privacy to
enable a fuller understanding of what it means today and how its values can be extracted for the
benefit of society as a whole. Fifthly, privacy and its conceptualizations have been criticized as an
expedient means to protect hypocrisy and safeguard the vested interest of certain groups of people at
the expense of the many. Richard Episten opines that privacy is “a plea for the right to misrepresent
one’s self to the rest of the world.”98 Pretence or duplicity is encouraged, he argues, in the name of
privacy, and the effect of this can be socially harmful and detrimental.99 Stephen Taylor writes that
“there is no widely accepted theory of what privacy is and what role it plays in our society, but it can
be usefully viewed as the protection of hypocrisy.”100 According to Bela Szabados and Eldon Soifer,
“it is impossible to have privacy without opening the door for hypocrisy and deceit, since the right
to privacy may be seen as creating the context in which both deceit and hypocrisy may flourish [...]
it provides the cover under which most human wrongdoing takes place, and then it protects the guilty
from taking responsibility for their transgressions once committed.”101 In other words, when the
protection of privacy steadily violates certain other values, we are led to consider whether it should
be valued at all.
However, there are a number of scholars who disagree with the assumption that hypocrisy will be
promoted by privacy protection, depending on how much value they place on privacy and how
abhorrent they consider hypocrisy.102 Nevertheless, although sceptics and reductionists reduce the
privacy argument to an argument concerning other interests, as we have noted above, there is also a
significant number of scholars who refuse to reduce privacy to non-privacy interests. James Rachels,
for example, argues that “[privacy] is a distinctive sort of right in virtue of the special kind of interests
it protects.”103 It is clear, however, that the diverse critiques discussed above are often based on some
faulty assumptions, some pitched at a conceptual level and others on a practical level, about how one
frames privacy and its policy implementation.104 Taking sides with Daniel Solove, who argues that
privacy is a conceptual shorthand for a cluster of problems that are not related by a common
denominator, but has elements in common having resemblances with each other, Bennett
demonstrates that “the critique from surveillance scholars is insufficiently sensitive to the ways in
which the privacy value has been reframed at a governance level to meet the collective challenges
posed by the broadening and deepening of surveillance.”105 In light of this remark, it makes sense to
96 Fred H. Cate, Privacy in the Information Age (Washington, DC: Brookings Institute Press, 1997), 29. 97 Solove, Understanding Privacy, 5. 98 Richard A. Epstein, “The Legal Regulation of Genetic Discrimination: Old Responses to New Technology,”
Boston University Law Review 74, no. 1 (1994): 12. 99 Solove, Understanding Privacy, 5. 100 Stephen Taylor, “Privacy is Power, as It Allows Us to be Hypocrites,”
http://www.opendemocracy.net/ourkingdom/stephen-taylor/privacy-is-power-as-it-allows-us-to-be-
hypocrites [accessed February 10, 2014]. 101 Bela Szabados and Eldon Soifer, Hypocrisy: Ethical Investigations (Canada: Broadview Press, 2004), 200. 102 Szabados and Soifer, Hypocrisy: Ethical Investigations, 200. 103 James Raches, “Why Privacy is Important,” Philosophy and Public Affairs 4, no. 4 (1975): 333. 104 Bennett, “In Defence of Privacy: The Concept and the Regime,” 485. 105 Bennett, “In Defence of Privacy: The Concept and the Regime,” 486.
Workplace Surveillance and Privacy
106
investigate the arguments of these contemporary scholars who defend privacy as a meaningful and
valuable concept.
3.1.3 Pro-Privacy Prospects and Positions
The criticisms levelled today against privacy are quite diverse, ranging from conceptual level to the
level of practice. However, coherent fundamental values and interests of privacy have led its
advocates to explore the concept further in contemporary multifaceted scenarios. For example,
Ferdinand Schoeman defends the coherent fundamental value of privacy interests by appeal to what
he calls the distinctiveness thesis. He first rejects the argument that privacy issues are diverse and
disparate and are connected only nominally. In other words, he rejects the idea that there is nothing
morally distinctive about privacy, and assumes, on the contrary, that privacy is both a coherent and
distinctive moral value.106 Privacy protects a person from social control by others, who could
otherwise access their information and exercise control over their decisionmaking. Many writers,
despite recognizing the inherent difficulties of a single conceptualization on the one hand, and despite
seeing the potential abuses in diverse realms of human life on the other, defend the value of privacy
protection.107 Researchers put forward numerous arguments as justifications of the need for privacy
protection.
First, we may analyse the ‘core value’ model, along with the conceptual framework of social
importance and the common good. James Moor’s justification of privacy goes beyond appealing to
the instrumental value of privacy (e.g., protection against harm) and points to its intrinsic value. He
assumes that autonomy is intrinsically valuable, and that privacy is a necessary condition for
autonomy.108 According to Charles Fried, however, “we do not feel comfortable about asserting that
privacy is intrinsically valuable, an end in itself privacy is always for or in relation to something or
someone. On the other hand, to view it as simply instrumental, as one way of getting other goods,
seems unsatisfactory too.”109 Reflecting in the same way, and analysing the pros and cons of both
intrinsic and instrumental argumentations, Moor suggests a third approach which he calls “core
value.” This is shared and is fundamental to human evaluation.110 His claim is empirical: “the core
value is that it is a value that is found in all human cultures ... [which] are at the core such as life,
106 The coherence thesis holds that diverse privacy claims and issues have in common the fundamental moral
value of privacy, while the distinctiveness thesis holds that there are moral values and principles distinct from
privacy that can be used to defend privacy claims. Ferdinand D. Schoeman, ed., Philosophical Dimensions of
Privacy: An Anthology (Cambridge: Cambridge University Press, 1984), 5-6. 107 Guerin, Smart Policies for Workplace Technologies, 8. 108 James H. Moor, “Towards a Theory of Privacy for the Information Age,” Computers and Society 27, no. 3
(1997): 28. 109 Charles Fried, An Anatomy of Values: Problems of Personal and Social Choice (Cambridge: Harvard
University Press, 1970), 137. 110 Intrinsic value is the value that an object has "in itself" or "for its own sake", as an intrinsic property.
According to Kagan, “the term “intrinsic value” does seem to wear its meaning on its sleeve — at least to the
philosophically trained — and the meaning it seems to wear is not value as an end, but rather the value that
an object has solely by virtue of its intrinsic properties.” S. Kagan, “Rethinking Intrinsic Value,” Journal of
Ethics 2 (1998): 290. Instrumental value, on the other hand, is the value of objects, both physical objects and
abstract objects, not as ends-in-themselves, but as means of achieving something else. It is often contrasted
with intrinsic value. Stanley Riukas indicates the meaning of these two kinds of values as follows, “that the
inherent values are, roughly speaking, the desired results achieved through the operation of the instrumental
values.” Stanley Riukas, “Inherent and Instrumental Values in Ethics,” Philosophy of Values,
http://www.bu.edu/wcp/Papers/Valu/ValuRiuk.htm [accessed February 19, 2014]. Apart from these, the core
values provide a common value framework, a set of standards, by which we can assess the activities of
different people and different cultures. It also allows us to make transcultural judgements, and these are the
values that we have in common as human beings. Moor, “Towards a Theory of Privacy for the Information
Age,” 29.
Workplace Surveillance and Privacy
107
happiness, freedom, knowledge, ability, resources and security.”111 According to Moor, privacy
protection, as an expression of a core value, such as the value of security, is also a plausible candidate
for an intrinsic good in the context of a highly computerized society in this postmodern era.112 Hence,
Moor argues that “it is important to think of privacy in terms of a control/restricted access account,
because this conception encourages informed consent as much as possible and fosters the
development of practical, fine grained, and sensitive policies for protecting privacy when it is not.”113
According to Bennett, the individualistic understanding of privacy, which we have previously
discussed in this chapter, barely constitutes a paradigmatic understanding of the problem.114 For the
“individualistic conception of privacy that predominates western thinking, is nevertheless inadequate
in terms of recognizing the effect of individual uptake of these kinds of technologies on the level of
privacy we are all collectively entitled to expect.”115 Along these same lines, Priscilla Regan, in her
work Legislating Privacy emphasizes the social importance of privacy by reconsidering its social or
public significance. She shares the growing concern for the value of privacy, extending from the
individual to society in general. She writes that,
Privacy has value beyond its usefulness in helping the individual maintain his or her dignity or
develop personal relationships. Most privacy scholars emphasize that the individual is better off
if privacy exists; I argue that society is better off as well when privacy exists. I maintain that
privacy serves not just individual interests but also common, public, and collective purposes.116
She continues:
Privacy is a common value in that all individuals value some degree of privacy and have some
common perceptions about privacy. Privacy is also a public value in that it has value not just to
the individual as an individual or to all individuals in common but also to the democratic political
system. [...] Privacy is rapidly becoming a collective value in that technology and market forces
are making it hard for any one person to have privacy without all persons having a similar
minimum level of privacy.117
In this way, this notion of social privacy restricts the encroachment on people’s lives of individuals,
institutions and even governments. Post reminds us that our concern for privacy protects the
individual against destructive social norms and promotes the construction of these norms in such a
way as to protect the “rules of civility” that shape life in community.118 Solove also affirms the social
importance of privacy, writing that it “certainly protects the individual, but not because of some
111 Moor, “Towards a Theory of Privacy for the Information Age,” 29. 112 Moor, “Towards a Theory of Privacy for the Information Age,” 29. 113 Moor, “Towards a Theory of Privacy for the Information Age,” 32. Control/restricted access theory is an
integrative theory distinct from the control theory and restricted access theory developed by Fried and
Gavison respectively. The control theory of privacy explains that people have privacy if and only if they have
control of their own information, where as the restricted access theory defines privacy as the limitation of
other’s access to an individual, based on secrecy, anonymity and solitude. Virginia Horniak, “Privacy of
Communication – Ethics and Technology” (unpublished master’s Thesis, Department of Computer Science
and Engineering, Malardalen University, 2004): 16.
See, http://www.idt.mdh.se/utbildning/exjobb/files/TR0390.pdf [accessed February 22, 2014]. 114 Bennett, “In Defence of Privacy: The Concept and the Regime,” 487. 115 Jane Bailey and Ian Kerr, “Seizing Control: The Experience Capture Experiments of Ringley and Mann,”
Ethics and Information Technology 9, no. 2 (2007): 129. 116 Priscilla M. Regan, Legalizing Privacy: Technology, Social Values, and Public Policy (London: University
of North Carolina Press, 1995), 221. 117 Regan, Legalizing Privacy: 213. 118 Robert C. Post, “The Social Foundations of Privacy: Community and Self in the Common Law Tort,”
California Law Review 77, no. 5 (1989): 968.
Workplace Surveillance and Privacy
108
inherent value of respect for personhood, [rather] because of the benefits it confers on society.”119
Hence, the failure to conceptualize privacy in a way that sustains public interest and support may
contribute to scepticism about privacy.
Valerie Steeves, in a similar vein, reconceptualizes privacy as a “dynamic process of negotiating
personal boundaries in inter-subjective relations […]. By placing privacy in the social context of
inter-subjectivity, privacy can be more fully understood as a social construction that we create as we
negotiate our relations with others on a daily basis.”120 Priscilla Regan, however, overthrows the
concept of “risk society,”121 a notion expressing the surveillance, monitoring and screening practices
required for managing risk. For her, such practices create an unquenchable thirst for more
information about the risks that exist generally, and the risks posed by certain individuals in
particular. The knowledge afforded by surveillance systems has no yield in the sense of security or
trust, but only produces new uncertainties leading to more surveillance and the collection of more
information.122 Hence, Regan argues that privacy is of value to society in general, a common good,
yet does so without compromising the priority given to it in relation to the individual. Therefore, we
need to treat privacy as an individual right that must be balanced with a concern for the common
good.
Secondly, we may consider the “contextual integrity”123 approach. Privacy is one of the most
enduring ethical issues associated with the adoption and adaptation of modern information
technologies. Helen Nissenbaum introduces in this line the concern for contextual integrity as an
alternative benchmark to identify the challenges of privacy and promote its value. This framework
of contextual integrity provides “guidance on how to respond to conflicts between values and
interests and to provide a systematic setting for understanding privacy expectations and the reasons
that certain events cause moral indignation.”124 This contextual integrity framework is based on two
principles: (i) the activities people engage in in a “plurality of realms” (i.e., spheres or contexts); and
(ii) the fact that each realm has a distinct set of norms that govern it.125 Norms affecting these
119 Solove, Understanding Privacy, 98. 120 Valerie Steeves, “Reclaiming the Social Value of Privacy,” in Lessons from the Identity Trail, eds. Ian Kerr,
Valerie Steeves and Carole Lucock, pp. 191-212 (Oxford: Oxford University Press, 2009), 193. See also,
Bennett, “In Defence of Privacy: The Concept and the Regime,” 487. 121 The concept of a risk society in fact drives the interest in the actions and transactions of all individuals and
the increase in surveillance throughout society. Institutions that deal with individuals collect all their
information and structure their dealings with those individual accordingly. Ericson and Haggerty however
hold that the concept of a risk society operates within a negative logic focusing on fear. It also underpins the
value system of insecurity and unsafe society that again demands more knowledge of risk. Priscilla M. Regan,
“Privacy as a Common Good in the Digital World,” Information, Communication and Society 5, no. 3 (2002),
382-405. See also, http://mason.gmu.edu/~pregan/commongood.html [accessed February 25, 2014]. 122 Priscilla M. Regan, “Privacy as a Common Good in the Digital World,”
http://mason.gmu.edu/~pregan/commongood.html [accessed February 25, 2014]. 123 Contextual integrity is an account of privacy in terms of the transfer of the personal information. It is a
conceptual framework used to understand the expectations and implications of privacy developed in various
literatures. Though it is not developed so as to offer a full definition of privacy, as a normative model it does
evaluate the flow of information between agents. Contextual integrity is defined with four key constructs:
informational norms, appropriateness, roles, and principles of transmission. Adam Barth, “Privacy and
Contextual Integrity: Framework and Applications,” IEEE Symposium on Security and Privacy (2006): 184-
185. 124 Adam Barth, Anupam Datta, John C. Mitchell and Helen Nissenbaum, “Privacy and Contextual Integrity:
Framework and Applications,” SP ’06 Proceedings of the 2006 IEEE Symposium on Security and Privacy,
IEEE Computer Society Washington, DC, USA (2006): 184. 125 Helen Nissenbaum, “Privacy as Contextual Integrity,” Washington Law Review 79, no. 1 (2004): 119-120.
See also, Frances Grodzinsky and Herman T. Tavani, “Privacy in “The Cloud”: Applying Nissenbausm’s
Theory of Contextual Integrity,” SIGCAS Computers and Society 41, no. 1 (2011): 40.
Workplace Surveillance and Privacy
109
principles, according to Nissenbaum, both shape and limit our roles, behaviour and expectations by
governing the flow of personal information in a given context.126 A central principle of contextual
integrity, Nissenbaum explains, is that “there are no arenas of life not governed by norms of
information flow, no information or spheres of life for which anything goes.”127 She explains privacy
not only in terms of the sharing of information itself, but especially in relation to the inappropriate
or improper sharing of information. The concept of contextual integrity is founded upon social
analysis and has as its fundamental precept that “there are no arenas of life not governed by norms
of information flow, no information or spheres of life for which anything goes.”128 Contexts that are
partly constituted by norms, expectations, and behaviours offer a platform for articulating a
normative account of privacy.
Nissenbaum writes that “contexts, or spheres, offer a platform for a normative account of privacy in
terms of contextual integrity.”129 According to Frances Grodzinsky and Herman T. Tavani “one
virtue of Nissenbaum’s theory is that it illustrates why we must always attend to the context in which
personal information flows, not the nature of the information itself, in determining whether normative
privacy protection is needed.”130 This is because people generally have a sense of what information
in relation to oneself is relevant, appropriate, or proper to particular circumstances.131 For instance,
Nissenbaum writes:
For the myriad transactions, situations and relationships in which people engage, there are norms
– explicit and implicit – governing how much information and what type of information is fitting
for them. Where these norms are respected, I will say that contextual integrity is maintained; where
violated, I will say that contextual integrity has been violated.132
For Nissenbaum, therefore, judgements that privacy has been violated correspond systematically
with branches of contextual integrity. As she explains, informational privacy is of two types,
consisting of norms of appropriation and norms of distribution. The norms of appropriateness
“circumscribe the type or nature of information about various individuals that, within a given context,
is allowable, expected, or even demanded to be revealed.”133 In the same way, the norms of
distribution remind us that “what matters is not only whether information is appropriate or
inappropriate for a given context, but whether its distribution, or flow, respects contextual norms of
information flow.”134 The former norms thus determine whether personal information is either
appropriate or inappropriate to disclose in a given context, while the latter norms restrict its flow
within and across contexts.135 When either of these norms is breached, she argues, a violation of
126 Nissenbaum, “Privacy as Contextual Integrity,” 119-120. 127 Nissenbaum, “Privacy as Contextual Integrity,” 119. 128 Nissenbaum, “Privacy as Contextual Integrity,” 119. 129 Nissenbaum, “Privacy as Contextual Integrity,” 120. 130 Grodzinsky and Tavani, “Privacy in “The Cloud”: Applying Nissenbausm’s Theory of Contextual
Integrity,” 40. 131 Nissenbaum, “Privacy as Contextual Integrity,” 120. 132 Helen Nissenbaum, “Protecting Privacy in an Information Age: The Problem of Privacy in Public,” Law
and Philosophy 17 (1998): 581-582. 133 Nissenbaum, “Privacy as Contextual Integrity,” 120. For instance, Nissenbaum illustrates that it is not
“expected to share our religious affiliation with employers, financial standing with friends and acquaintances,
performance at work with physicians, etc. As with other defining aspects of contexts and spheres, there can
be great variability from one context to the next in terms of how restrictive, explicit, and complete the norms
of appropriateness are.” Nissenbaum, “Privacy as Contextual Integrity,” 121. 134 Nissenbaum, “Privacy as Contextual Integrity,” 123. 135 Nissenbaum, “Privacy as Contextual Integrity,” 125.
Workplace Surveillance and Privacy
110
privacy occurs, and thus every instance of public surveillance violates the right to privacy because it
violates contextual integrity.
To elaborate a little further: “the central concepts drawn from contextual integrity include contexts,
roles, and a focus on the type of information transmitted [...] rather than specifics of the data.”136
These are based on two kinds of norms – positive and negative – that “allow” and “deny” rules to
access/control conditions in a given situation. These rules are interpreted as respecting the norms
model of communication.137 However, “it [contextual integrity] is not proposed as a full definition
of privacy, but as a normative model, or framework, for evaluating the flow of information between
agents (individuals and other entities), with a particular emphasis on explaining why certain patterns
of flow provoke public outcry in the name of privacy (and why some do not).”138 In the same manner,
it is argued that “the intricate systems of social rules governing information flow are the crucial
starting place for understanding normative commitments to privacy.”139 Thus, by bringing the social
layer into view, contextual integrity measures how closely the flow of personal information conforms
to context-relative informational norms.
Thirdly, researchers regard privacy as a universal necessity. Solove, examining different readings
and conceptions of privacy and aiming to develop an all-encompassing theory of privacy, proposes
a taxonomy of privacy as a framework for understanding privacy in a pluralistic and contextual
manner. His taxonomy aims to identify and understand different kinds of socially recognized privacy
violations and order the various harms caused by privacy infringements. It is intended as a
contribution to the development of a body of law that addresses privacy.140 The collection, processing
and dissemination of information, and its invasion, are basic activities included in the taxonomy.
Solove’s model begins with the data subject, the individual, from which other entities like businesses
and governments collect information. This information gathering can in itself be a harmful activity.141
The collected data could be processed as they are stored, combined, manipulated, searched, used and
transferred or released to a third party. This process moves the data away from the individual’s
control, and thus constitutes an invasion privacy that impinges directly on the individual.142 Hence,
with this taxonomy of privacy Solove in fact provides an account of information invasion that enables
a clearer understanding of privacy issues. This model will be used in this chapter to analyse the issue
of privacy and electronic surveillance in the workplace, which is the core element of this research.
Moore begins his reflection on privacy by analysing all previous conceptions of it, arguing that
privacy rights, understood as the ability to regulate access to our bodies, capacities, and powers and
to sensitive personal information, are necessary and essential for human well-being or flourishing.143
136 Barth, Datta, Mitchell and Nissenbaum, “Privacy and Contextual Integrity: Framework and Applications,”
1. 137 Barth, Datta, Mitchell and Nissenbaum, “Privacy and Contextual Integrity: Framework and Applications,”
1. They explain it further that, “a positive norm permits communication if its temporal condition is satisfied,
whereas a negative norm permits communication only if its temporal condition is satisfied.” Besides, it is
access control policies that “enable a system to decide whether to allow or deny a specific action, typically
by deriving a relation between subjects, objects, and actions.” Barth, Datta, Mitchell and Nissenbaum,
“Privacy and Contextual Integrity: Framework and Applications,” 1-2. 138 Barth, Datta, Mitchell and Nissenbaum, “Privacy and Contextual Integrity: Framework and Applications,”
2. 139 Barth, Datta, Mitchell and Nissenbaum, “Privacy and Contextual Integrity: Framework and Applications,”
2. 140 Solove, Understanding Privacy, 10. 141 Solove, Understanding Privacy, 103. 142 Solove, Understanding Privacy, 103. 143 Adam D. Moore, “Privacy: Its Meaning and Value,” American Philosophical Quarterly 40, no. 3 (2003):
223.
Workplace Surveillance and Privacy
111
A moral authority to control physical objects in arrangements that support our lifelong goals and
projects is necessary, he argues, for a life to be worth living, and thus he defines the right to privacy
as “a right to control access to, and uses of, places, bodies, and personal information.”144 The
emphasis on control over access in this definition seems very coherent, as it includes bodily privacy,
informational privacy, and decisional privacy. Moore holds that the argument that privacy is a
cultural phenomenon and that its form or content depend on customs and social practices, is shown
to be inadequate when we extend our analysis to include thousands of cultures. Such an analysis
shows that there are exceptionally few cultures that appear to acknowledge no privacy.145 Hence, for
Moore, the need for privacy is not culturally relative, though its forms may be, and therefore, “having
the ability and moral authority to regulate access to and uses of locations and personal information
is an essential part of human flourishing and well-being.”146
A number of interests are evidently harmed by the invasion of privacy, many of which are closely
linked to the accounts of restricted information, control over the body and decision making, and
sustaining human dignity with intimacy, autonomy and so forth. Privacy is supposed to provide
protection against overreaching physical, mental, informational and social control by others. Many
people who view privacy as a valuable interest also realize that it is now threatened more than ever
by technological advances, in view of the massive databases and extensive records that are now
possible. In this regard, we will further examine here particularly electronic surveillance in the Indian
IT/BPO workplace, and the attendant privacy issues, by analysing the taxonomy of privacy. For this
taxonomy, though itself just one among many approaches to privacy, explains very well the kind of
informational invasion that most often intrudes in the workplace.
3.2 WORKPLACE SURVEILLANCE AND PRIVACY ISSUES: INDIAN SCENARIO
Though the invasion of somebody’s privacy is regarded as something distressful and harmful, it is
happening more than ever in the Indian organizational workplace. This coincides with the
overwhelming rise of sophisticated technological advancements and the subsequent growth of the IT
workforce, discussed in the previous chapter, and of BPOs and call centres in particular.147 There has
been considerable debate about the nature of employment created in these ways and the multifaceted
challenges posed by workplace practices in call centres or other service delivery organizations. Many
researchers of call centre work, notably Ernesto Noronha and Premilla D’Cruz, highlight that “the
existence of a paradox of tightly controlled, heavily monitored and scripted work juxtaposed with
high commitment practices.”148 Employee monitoring has emerged as an issue because of the privacy
rights concerns of individuals. When extended monitoring is implemented as part of cost
minimization or other managerial strategies, employees feel dissatisfaction, which leads in turn to
high levels of absenteeism and turnover. For according to Mohan Thite and Bob Russell, “the
inherent negative characteristics of offshored call centre work with high performance monitoring and
144 Adam D. Moore, Privacy Rights: Moral and Legal Foundations (Pennsylvania: The Pennsylvania State
University Press, 2010), 27. 145 Moore, Privacy Rights: Moral and Legal Foundations, 49. 146 Moore, Privacy Rights: Moral and Legal Foundations, 56. 147 Many surveillance researchers opine that the call centres represent most pervasive monitored workplaces
due to their highly techno-mated infrastructure and their services with sophisticated communication
technologies and software systems. Michael Blakemore, “Surveillance in the Workplace: An Overview of
Issues of Privacy, Monitoring, and Ethics,” Briefing Paper for GMB 2005,
http://www.mindfully.org/Technology/2005/Surveillance-Workplace-Blakemore1sep05.htm. [accessed
November 15, 2016]. 148 Ernesto Noronha and Premilla D’Cruz, Employee Identity in Indian Call Centres: The Notion of
Professionalism (New Delhi: Respnose, 2009), 4.
Workplace Surveillance and Privacy
112
low job discretion are said to contribute to employee dissatisfaction and therefore, turnover.”149 This
is experienced quite often in Indian call centres, as these practices create an intense pressure to meet
the target by imposing external observing systems and monitoring the employees extensively.
3.2.1 Impacts of Snooping Eye in Indian Call Centres
Researchers on Indian outsourced call centres raise the issue of high levels of labour exploitation due
to constant surveillance.150 Quoting Peter Bain et al., Upadhya and Vasavi state that call centre work
and its subsequent “use of information and communication technologies has elevated management
control to new historical levels by target-setting and monitoring, in real time, both quantitative and
qualitative aspects of employee performance.”151 It is the case globally that call centres which are
most target-focused, or in other words quantity-focused, are the most heavily monitored, while those
which are more oriented to the service, or the quality-focused, are less likely to apply the full range
of surveillance technologies and mechanisms.152 Electronic and other surveillance systems are
extensively used across Indian call centres, however, as part of the expectation that “the work and
employment systems in Indian call centres [are] more tightly constrained and standardised [...].”153
Babu P. Ramesh also opines in the same manner that “technologically aided controls and surveillance
mechanisms allow firms to pursue the twin objectives of rationalization (cost minimisation) along
with standardisation (quality check).”154 But, Ramesh continues, on the contrary, “[t]he domination
of technology over labour is evident in all aspects of workplace design and organization, such as
surveillance and monitoring, fixing and maintaining target and evaluation of performance of the
employee.”155 As noted above, he even compares the degree of surveillance at work in Indian call
centres to the situation of nineteenth century prisons or even Roman slave ships.156 Therefore the
physical and psychological and even torturous effects of workplace surveillance are all the more
clear here in the context of Indian call centre work.
In an interview conducted by Pawan Budhwar, Neeru Malhotra and Virender Singh with regard to
the ever-present surveillance in the call centres, an associate of an Indian voice-based call centre
expressed that “perhaps, the drawback of this kind of supervision system is that people don’t want
to be supervised all the time; they don’t want to be checked and monitored by someone all the
time.”157 The customary Indian hierarchical work culture, discussed in the second chapter, has been
transposed to BPOs and call centres, and surveillance through electronic and other monitoring
systems is reported to be carried out with “managerial and supervisory arbitrariness and authoritarian
149 Mohan Thite and Bob Russel, “Human Resource Management in Indian Call Centres/Business Process
Outsourcing,” in The Next Available Operator: Managing Human Resources in Indian Business Process
Outsourcing Industry, eds. Mohan Thitte and Bob Russell, 34-58 (Los Angeles: Response, 2009), 38. 150 Jake Skeers, “Study Documents Exploitation in Indian Call Centres,” World Socialist Web Site, November
23, 2005, https://www.wsws.org/en/articles/2005/11/indi-23n.html [accessed November 12, 2016]. 151 Upadhya and Vasavi, “Outposts of the Global Information Economy,” 30. 152 Philip Taylor and Peter Bain, “Trade Unions, Workers’ Rights and the Frontier of Control in UK Call
Centres,” Economic and Industrial Democracy 22 (2001): 39-66. 153 Rosemary Batt, Virginia Doellgast and Hyunji Kwon, “Employment Systems in Call Centres in the United
States and India,” in The Next Available Operator: Managing Human Resources in Indian Business Process
Outsourcing Industry, eds. Mohan Thitte and Bob Russell, 217-252 (Los Angeles: Response, 2009), 224. 154 Remesh, “Work Organization, Control and ‘Empowerment’,” 246. 155 Remesh, “Work Organization, Control and ‘Empowerment’,” 246. 156 Remesh, “Work Organization, Control and ‘Empowerment’,” 246. 157 Pawan Budhwar, Neeru Malhotra and Virender Singh, “Work Process and Emerging Problems in Indian
Call Centres,” in The Next Available Operator: Managing Human Resources in Indian Business Process
Outsourcing Industry, eds. Mohan Thitte and Bob Russell, 59-82 (Los Angeles: Response, 2009), 68.
Workplace Surveillance and Privacy
113
treatment including disciplinary action and even dismissal on trivial grounds.”158 In the same way,
several studies of Indian call centre workers have found that “routinised work design and high levels
of electronic monitoring lead to stress, anxiety, depression, emotional exhaustion and burnout.”159
Jake Skeers, for instance, express the same concern as he writes, “[c]all centre employees are under
constant stress because of their workload, competitive pressures and surveillance. Workers are
monitored for the number of calls, the average call time and time between calls. Closed circuit
cameras and electronic timers monitor the time staff are away from their desk, including in the
bathroom.”160 Besides, the very sense of self by employees is threatened and devalued in a milieu of
constant monitoring, as Upadhya and Vasavi rightly point out: “the development of subjective
mechanisms of control means that the employment relationship is no longer purely economic but
involves the shaping of the employee’s very sense of self.”161 Electronic and other means of
surveillance permit authorities to achieve ‘panoptic control’ over workers, while creating an ultimate
surveillance regime by which employees lose control over their own self and behaviour.
This panoptic mechanism in Indian call centres does not elude the workers being subjected to “the
gaze of computer, the gaze of supervisor, the manager, the fellow production worker, and finally the
internal gaze of the self.”162 This control also causes the manipulation of data by management and
thus constrains one’s sense of self and his or her physical and informational privacy. The ‘electronic
panopticons’ demonstrate the “control by management over the work process is near-complete and
workers have little autonomy or space for manoeuvre.”163 It also shows that the surveillance systems
are not often technologically deterministic, as G. Lankshear and D. Mason opine: “technology does
not in itself supervise workers. It is a tool giving data to be interpreted and used by supervisors or
managers. It is their choice of how to use it that affects the nature of social interaction within the call
centre.”164 This means that, in situations where data is handled by a third party, the capacity or right
of every individual to informational and bodily self-determination, which is a prerequisite to the
human capacity of social discourse participation, is violated and infringed.165
In like manner, although quality control and the careless release of sensitive data are matters of
constant concern for employers and often lead them to implement surveillance practices, certain
surveillance practices often create oppressive working regimes. Amrit Dhillon illustrates this based
on Indian call centre scenarios that several people express either resignation or acceptance, as there
158 Phil Taylor, Premilla D’Cruz, Ernesto Noronha and Dora Scholarios, “Union Formation in Indian Call
Centres,” in The Next Available Operator: Managing Human Resources in Indian Business Process
Outsourcing Industry, eds. Mohan Thitte and Bob Russell, 145-181 (Los Angeles: Response, 2009), 153-154. 159 Batt, Doellgast and Kwon, “Employment Systems in Call Centres in the United States and India,” 225. See
also, David Holman, “Employee Well-Being in Call Centres,” in Call Centres and Human Resource
Management, eds. Stephen Deery and Nick Kinnie (Basingstoke: Palgrave, 2004): 223-244; Jagdip Singh,
“Performance Productivity and Quality of Frontline Employees in Service Organizations,” Journal of
Marketing 64, no. 2 (2000): 15-34. 160 Jake Skeers, “Study Documents Exploitation in Indian Call Centres,” World Socialist Web Site, November
23, 2005, https://www.wsws.org/en/articles/2005/11/indi-23n.html [accessed November 12, 2016]. Cf.
Kaupins and Coco, “Perceptions of Internet-of-Things Surveillance by Human Resource Managers,” 54. 161 Upadhya and Vasavi, “Outposts of the Global Information Economy,” 23. 162 Upadhya and Vasavi, “Outposts of the Global Information Economy,” 30. 163 Upadhya and Vasavi, “Outposts of the Global Information Economy,” 31. 164 G. Lankshear and D. Mason, “Within the Panopticon? Surveillance, Privacy and the Social Relations of
Work in Two Call Centres,” Paper presented to the Work, Employment and Society Conference, September
11-13, 2001, 19. 165 Lilian Mitrou and Maria Karyda, “Employees’ Privacy vs. Employers’ Security: Can They Be Balanced?”
Telematics and Informatics 23 (2006): 167.
Workplace Surveillance and Privacy
114
is no other way than to do so, while others find it intrusive, threatening, and oppressive.166 let us
explore now the issues of privacy in Indian organizational workplaces by analysing an exploratory
study conducted by Ponnurangam Kumaraguru and Lorrie Cranor.167 This will enable us to
understand Indian attitudes about privacy and assess privacy-related issues in the Indian context.
3.2.2 Data Security, Personal Space, Data Mining and Identity Theft
In India, where data security is seen to be of paramount importance, there is growing concern about
the loss of data security due to various forms of surveillance used in the workplace and the threat this
poses to employee privacy.168 Any unauthorized intrusion to one’s freedom to be oneself is invasion
of one’s privacy. With the data security, it is hard to determine the extent of information needed from
employees. For instance, though there are strict policies regarding non-disclosure of employee
records in many organizations in India, the queries, for example, regarding the authenticity of an
employee’s records for marriage proposals, are often ridiculous and amount to clear invasions of
individual privacy since these types of queries often exceed the context of employment.169 This is a
typical example of unwanted information seeking that invades employee privacy, even at the time of
employee recruitment. Similarly, employee communications are not private.170 As already discussed,
Indian workers have almost no proper legal protection, constitutional or federal, from employers who
want to poke or prod into their personal and work lives. Kumaraguru and Cranor observe, at the
beginning of their surveys and personal interviews, that several organizations push government and
industry for adequate data protection laws as they foresee and fear the limit of its future growth,
given that India lacks proper privacy legislation.171
As India today experiences the increased presence of BPOs and call centres, there is a remarkable
amount of data flow into India. Since India lacks constitutional privacy laws, concerns have arisen
as to whether this data will remain private and confidential.172 This is a general privacy concern that
Indian organizations face. With respect to the Indian high-tech workforce and the specific privacy
issues they face in the workplace, 76% of respondents to this survey were very or somewhat
concerned about personal privacy, and over 80% about personal privacy on the internet.173 At the
same time they also conclude that the Indian high tech workforce is often not sufficiently aware of
privacy issues.174 This may be because of Indian cultural values related to its character as a
collectivistic society with lower individualism and high power distance, as discussed in our analysis
of Hofstede in the second chapter. India possesses more trust and faith in other people than anyone
in countries with more individualistic cultural values. Kumaraguru and Cranor opine the same, and
write that the value of trust that any collectivistic society invariably holds will play a leading role,
166 Amrit Dhillon, “Big Brother Keeps Eye on Indian Call Centres,” South China Morning Post, September 1,
2015, http://www.scmp.com/article/514350/big-brother-keeps-eye-indian-call-centres [accessed November
12, 2016]. 167 Ponnurangam Kumaraguru and Lorrie Cranor, “Privacy in India: Attitudes and Awareness,” in Privacy
Enhancing Technologies, eds. George Danwzis and David Martin (Berlin: Springer, 2005): 243-258. 168 Krishnan, Varkkey and Raghavan, “Employee Privacy at Workplaces: Some Pertinent Issues,” 4. 169 Krishnan, Varkkey and Raghavan, “Employee Privacy at Workplaces: Some Pertinent Issues,” 5. 170 Guerin, Smart Policies for Workplace Technologies, 10. 171 Kumaraguru and Cranor, “Privacy in India: Attitudes and Awareness,” 243. 172 Kumaraguru and Cranor, “Privacy in India: Attitudes and Awareness,” 243. However, as we have noted,
privacy is read as a fundamental right and an intrinsic part of Article 21 that protects life and liberty of the
citizens and as a part of the freedoms guaranteed by Part III of the Indian Constitution. The new privacy Bill
is under consideration of the government. 173 Kumaraguru and Cranor, “Privacy in India: Attitudes and Awareness,” 249. This study was a qualitative
research survey conducted through interviews among various stakeholders in Delhi and National Capital
Region (NCR). 174 Kumaraguru and Cranor, “Privacy in India: Attitudes and Awareness,” 255.
Workplace Surveillance and Privacy
115
and thus people generally will trust that their personal information will not be misused and are
“largely unaware of the extent to which databases of personal information are sold and traded among
companies.”175 In the same manner, the Indian traditional joint family system increasingly enables
people to share personal information with a wider group,176 and thus people are less bothered about
issues of privacy protection.
Though privacy is generally defined as the “claim of individuals, groups, or institutions to determine
for themselves when, how and what extent information about themselves is communicated to
others,”177 in India privacy is more often thought of in terms of personal space and subjects, and only
then in connection with the issue of data mining, identity theft, and workplace bullying. This is
different than in the US, where privacy is explained more in terms of information privacy, financial
information and identity theft.178 Thus workplace monitoring and watching over employees through
electronic and other technologies is a real intrusion of personal space for Indian workers, as it controls
one’s physical being along with one’s personal information. With regard to data protection, whether
in-house or off-shore, the issue concerns the ethical behaviour of both employers and employees.
Indian companies have taken steps to improve these security measures.179 Any workplace monitoring
should respect the “boundary around the person, a personal space that ought not to be entered by the
other” and this right to non-interference is part of privacy and the most valued right.180 It is interesting
and essential at this stage to see how the normal watching over and supervision of employees can
become, respectively, spying and intrusion.
We take, for instance, the issue of electronic monitoring that continues its relentless advance in the
booming Indian IT industry. The problem of this ever-present surveillance is that “it is dehumanizing
to be judged by a machine, that the machine cannot measure good work as opposed to much work,
and that the devices regularly permit employers to read e-mail and notes stored on the computer for
personal reference only.”181 This issue of dehumanization in the workplace will be analysed in detail
in the following chapters.
India, as one of the leading IT service providers and a rapidly emerging platform for business process
outsourcing, experiences in its workplaces an increased number of internet users and amazing
penetration of technology. This has brought with it greater employee exposure to newly recognized
e-threats and breaches of informational and other kinds of individual privacy. According to Simpson
and Byrski, “electronic workplace monitoring is often undertaken for largely positive reasons,
frequently related to productivity enhancement and liability alleviation, but tends to result in
175 Kumaraguru and Cranor, “Privacy in India: Attitudes and Awareness,” 245. To know the current laws and
trends of data transfer see, Clarisse Girot, ed., Regulation of Cross-Border Transfers of Personal Data in Asia
(Singapore: Asian Business Law Institute, 2018), 117-141. 176 Kumaraguru and Cranor, “Privacy in India: Attitudes and Awareness,” 245. 177 S.K. Sharma, Privacy Law: A Comparative Study (New Delhi: Atlantic Publishers, 1994), 1. 178 Anjaly Agarwal, “Data Protection and Privacy Laws,” The International Journal of Science & Technology
2, no. 2 (2014): 15. For instance we see in the interview report typical responses of Indian subjects that,
“Privacy for me is my personal territory” and “personal privacy,” where as a typical response from a US
subject was: “[Privacy is] not allowing other people to have your information. It is protection of your
information from outside people.” Ponnurangam Kumaraguru, Lorrie Faith Cranor, and Elaine Newton,
“Privacy Perceptions in India and the United States: An Interview Study,” The 33rd Research Conference on
Communication, Information and Internet Policy (TPRC), 2005.
http://www.cs.cmu.edu/~ponguru/tprc_2005_pk_lc_en.pdf [accessed October 5, 2016]. 179 Nipul Patel and Susan E. Conners, “Outsourcing: Data Security and Privacy Issues in India,” Issues in
Information Systems 9, no. 2 (2008): 15. 180 Lisa Newton, Business Ethics in the Social Context: Law Profits and the Evolving Moral Practices of
Business, (New York: Springer, 2014), 36. 181 Newton, Business Ethics in the Social Context, 36.
Workplace Surveillance and Privacy
116
unforeseen damage to workplace relationships, [...] and deteriorating organizational culture.”182 For
example, in India, though monitoring does have certain benefits for the employee, as it keeps them
efficient and focused and discourages unethical or illegal conduct, it becomes very problematic when
every detail of the words, actions, behaviours, communications and whereabouts of employees are
tracked and monitored. Such excessive and unreasonable monitoring and the feeling of total
surveillance it produces can, Ciocchetti explains, “(1) invade an employee’s reasonable expectation
of privacy; (2) lead employees to sneak around to conduct personal activities on work time; (3) lower
morale; (4) cause employees to complain and, potentially, quit, and (5) cause employees to fear using
equipment even for benign work purposes.”183 Monitoring is also linked with physical and mental
illness and other health hazards, such as “increased boredom, high tension, extreme anxiety,
depression, anger severe fatigue and musculoskeletal problems.”184 These problems continue to
increase and often adversely affect employee behaviour and well-being.
According to Kizza and Ssanyu, “the most devastating effect of employee monitoring is the fear of
losing one’s job.”185 They summarize the most influential effects of employee monitoring, as follows:
Employee monitoring has the potential to undermine workplace morale and create distrust and
suspicion between employees and their supervisors. It may also create high levels of stress and
anxiety in the workplace due to constant monitoring. Fear that employees feel when they are being
monitored in this way may result in repetitive strain injuries. It also inhibits individual creativity and
self-esteem. Reduced or absent networks of peer social support may produce worker alienation,
which may in turn have adverse psychological effects.186 Botan and Vorvoreanu also opine that the
possible detrimental effects of electronic surveillance are not restricted to legal risks alone, but also
concern the possibility that employee relations and morale may be negatively affected.187 Mujtaba
stresses this adverse aspect of monitoring very well, claiming that “this surveillance can inject an air
of suspicion and hostility into the workplace and it can be counterproductive as it can cause
resentment in employees at being treated like children, and the culture also can become one of a
mistrust and hostile work environment when employees do not see the justification of monitoring.”188
Diminishing personal privacy, according to Botan and Vorvoreanu, is one of the most ethically
important effects of surveillance, because “it infringes upon the human right to a private identity and
the decision making autonomy based on it.”189 Kizza and Ssanyu add that this type of monitoring has
found its way beyond employee monitoring into the field of crime fighting.190
However, in workplace monitoring in India, problems related to ‘data mining’, ‘identity theft’ and
cyber-bullying are on the rise more than ever before.191 Conceptual clarification of these have already
182 Simpson and Byrski, “The 21st Century Workplace,” 22. 183 Ciocchetti, “The Eavesdropping Employer,” 285-369. 184 Martin and Freeman, “Some Problems with Employee Monitoring,” 354. 185 Kizza and Ssanyu, “Workplace Surveillance,” 12. 186 Kizza and Ssanyu, “Workplace Surveillance,” 12-14. 187 Botan and Vorvoreanu, “What Do Employees Think about Electronic Surveillance at Work?” 129. 188 Bahaudin G. Mujtaba, “Ethical Implications of Employee Monitoring: What Leaders Should Consider,”
Journal of Applied Management and Entrepreneurship.
http://www.huizenga.nova.edu/Jame/articles/employee-monitoring.cfm [accessed December 8, 2013]. 189 Botan and Vorvoreanu, “What Do Employees Think about Electronic Surveillance at Work?” 130. 190 Kizza and Ssanyu, “Workplace Surveillance,” 8. 191 Tina K. Stephen, and Arun Sasi, “Analysis of Potential Legal Strategies for Mitigation of Workplace
Bullying in India,” Management and Labour Studies 42, no. 1 (2017): 20-38; Premilla D'Cruz, Megan Paull,
Maryam Omari and Burcu Guneri-Cangarli, “Target Experiences of Workplace Bullying: Insights from
Australia, India and Turkey,” Employee Relations 38, no. 5 (2016): 805-823; Vimal Kumar M. and Sriganga
B.K., “A Review on Data Mining Techniques to Detect Insider Fraud in Banks,” International Journal of
Advanced Research in Computer Science and Software Engineering 4, no. 12 (2014): 370-380; and Vijaya
Workplace Surveillance and Privacy
117
been given in previous chpaters. Data mining, known as data or knowledge discovery, is the process
of analyzing data from different perspectives and summarizing it into useful information.192
According to Michael J. Quinn, “Data mining is the process of searching through one or more
databases looking for patterns or relationships, and it is a way to generate new information by
combining facts found in multiple transactions. [...] By drawing upon large number of records, data
mining allows an organization to build an accurate profile of an individual from a myriad of
snapshots.”193 It is actually the search for new, valuable and nontrivial information in a large volume
of data, and now is a cooperative effort of both human beings and computers.194 Through data mining
software and tools, the user can analyze data from many different dimensions and angles and
categorize it, then summarize the identified relationships.195 Thus, data mining technically finds out
the correlations or patterns among dozens of fields in large relational databases.196 Individual privacy
is one of the key issues raised by data mining in the organizational workplace.
Data mining consists of five major elements: (1) the extraction, transformation, and loading of
transaction data onto the data warehouse system, (2) the storage and management of the data in a
multidimensional database system, (3) the provision of data access to business analysts and
information technology professionals, (4) the analysis of this data by application software, and (5)
the presentation of the data in a useful format, such as a graph or table.197 However, the ‘secondary
use’198 of this data raises several issues related to data collected, which in turn affects the person to
whom the data pertains. In the Indian workplace, a key issue raised by data mining is the protection
of individual privacy. Employees have a right to privacy in their personal records. Moor explains
that an “individual has privacy if and only if information related to this individual is protected from
intrusion, observation and surveillance by others.”199 Personal records, therefore, are disclosed only
Geeta, “Online Identity Theft – An Indian Perspective,” Journal of Financial Crime 18, no. 3 (2011): 235-
246. 192 Pinelopi Troullinou, “Rethinking Privacy and Freedom of Expression in the Digital Era: An Interview with
Mark Andrejevic,” Westminster Papers in Communication and Culture 12, no. 3 (2017): 76. 193 Quinn, Ethics for the Information Age, 219. 194 Stephen, and Arun Sasi, “Analysis of Potential Legal Strategies for Mitigation of Workplace Bullying in
India,” 20-38; Colleen McCue, Data Mining and Predictive Analysis: Intelligence Gathering and Crime
Analysis, 2nd ed., (Oxford: Elsevier, 2015), 3-33; Shu-Hsien Liao, Pei-Hui Chu and Pei-Yuan Hsiao, “Data
Mining Techniques and Applications – A Decade Review from 2000 to 2011,” Expert Systems with
Applications 39 (2012): 11303. Data mining methods include generalization, characterization, classification,
clustering, association, evolution, pattern matching, data visualization and meta-rule guided mining. 195 Geeta, “Online Identity Theft – An Indian Perspective,” 235-246; Ball, “Workplace Surveillance,” 91. 196 It is primarily used by companies and other organizational workplace managers and marketing
organizations. It enables these companies and other organizations to determine relationships among "internal"
factors (price, product positioning, or staff skills) and "external" factors (economic indicators, competition,
and customer demographics). Subsequently, it enables them to determine the impact on sales, customer
satisfaction, and corporate profits. Problems arise when collected data are used, with or without the consent
of the persons concerned, beyond the context in which they are collected and the reasons for which they were
stored.
http://www.anderson.ucla.edu/faculty/jason.frand/teacher/ technologies/palace/datamining.htm [accessed
December 5, 2013]. 197 “Data Mining: What is Data Mining,” Technology Note prepared for Management 274A, Anderson
Graduate School of Management at UCLA (1996). For detailed description of the issue of data mining, see,
http://www.anderson.ucla.edu/faculty/jason.frand/teacher/technologies/palace/datamining.htm [accessed
April 30, 2013]. 198 Secondary use of information is very frequent today. When the information collected is used for another
purpose than its actual intention, it is called the secondary use of the information. The information then
becomes a commodity when organizations sell or exchange information with other organizations, and it
became a common way to gather large databases of information they can mine. See Quinn, Ethics for the
Information Age, 219. 199 James H. Moor, “The Ethics of Privacy Protection,” Library Trends 39, nos. 1 & 2 (1990): 76.
Workplace Surveillance and Privacy
118
in certain specific circumstances. Data mining, however, garners a significant amount of information
about employees’ habits and preferences. To what extent one can keep and share the record of an
employee’s data is a delicate issue and worthy of reflection. Here the integrity of data gathered is
also questioned, because data analysis is only as good as the data being analyzed. Very often, when
data from different or even sometimes opposing or contradicting sources is collected, it is difficult
to integrate.
Identity theft is a growing problem related to data mining and is defined as “the misuse of another
person’s identity, such as name, social security number, driver’s license, credit card numbers, and
bank account numbers.200 The objective is to take actions permitted to the owner of the identity, such
as withdraw funds, transfer money, charge purchases, and get access to information, or issue
documents and letters under the victim’s identity.”201 Any transactions performed by people who
have stolen the identities of others will create major problems in the database by giving the false
impression that they are the activities of the actual person.202 This occurs when a person disguises or
pretends to be someone else by assuming their identity, in order to attain some resource or benefit.
The victim, whose identity is stolen, suffers the adverse consequences of the actions the other takes
in his/her name. This can happen when the other gets a person’s personal details by mistake or steals
one’s personal information by fraud and uses it without permission.203 This is a serious crime that
can lead to disaster in one’s reputation, finances, etc. Thus, all information relating to an employee’s
personal life, other behavioural characteristics and traits is private and confidential, and this
information should be released only in certain specific cases where it is necessary.
3.2.3 Workplace (Cyber) Bullying and Victimization
Premilla D’Cruz, Associate Professor of Organizational Behaviour at the Indian Institute of
Management in Ahmedabad, defines workplace bullying as “subtle and/or obvious negative
behaviours embodying aggression, hostility, intimidation, and harm, characterized by repetition and
persistence, displayed by an individual and/or group and directed towards another individual and/or
group at work in the context of an existing or evolving unequal power relationship.”204 In this way,
such bullying is a negative behavioural pattern in the workplaces. D’Cruz illustrates two types of
bullying in the workplace: (1) personal bullying, consisting of behaviours of “making insulting
remarks, excessive teasing, spreading gossip or rumours, persistent criticism, playing practical jokes,
200 Annie Qureshi, “Big Data is Both a Weapon and Liability with Identity Theft,” SmartDataCollective,
March 6, 2018, https://www.smartdatacollective.com/big-data-weapon-liability-identity-theft/ [accessed
October 28, 2018]. Cf. Vidushi Jaswal, “Psychological Effects of Workplace Surveillance on Employees, and
the Legal Protection: An Analysis,” Bharati Law Review (Jan.- March 2017): 67. 201 Originally in Dorothy E. Denning, Information Warfare and Security, (Boston, MA: Addison-Wesley,
1999). Cf. Michael J. Quinn, Ethics for the Information Age (Boston: Pearson-Addison-Wesley, 2005), 224.
According to current federal law, identity theft is a federal crime when someone knowingly transfers,
possesses, or uses, without lawful authority, a means of identification of another person with the intent to
commit, or to aid or abet, or in connection with, any unlawful activity that constitutes a violation of Federal
law, or that constitutes a felony under any applicable State or local law (18 U.S.C. §1028(a), 7). Kristin M.
Finklea, “Identity Theft: Trends and Issues,” Congressional Research Service,
http://www.fas.org/sgp/crs/misc/R40599.pdf [accessed February 15, 2013]. Cf. Dan Boneh, Joan
Feigenbaum, Avi Silberschatz and Rebecca N. Wright, “PORTIA: Privacy, Obligations, and Rights in
Technologies of Information Assessment,” Bulletin of the IEEE Computer Society Technical Committee on
Data Engineering 27, no. 1 (2004): 10-18. 202 Quinn, Ethics for the Information Age, 222. Cf. Heidi A. McKee, “Policy Matters Now and in the Future:
Net Neutrality, Corporate Data Mining, and Government Surveillance,” Computers and Composition 28
(2011): 276-291. 203 Quinn, Ethics for the Information Age, 224. 204 Premilla D’Cruz, Workplace Bullying in India (New Delhi: Routledge, 2012), xv.
Workplace Surveillance and Privacy
119
and intimidation; and (2) work-related bullying, consisting of giving unreasonable deadlines or
unmanageable workloads, excessive monitoring of work and assigning meaningless tasks.205 This
shows that excessive monitoring itself is a sort of bullying that causes unnecessary stress in the
workplace. She continues to observe that:
Though these behaviours may be relatively common in workplaces, when frequently and
continually directed towards the same individual and/or group of individuals with increasing
intensity, they undermine, demoralize and humiliate the latter, draining his/her/their coping
resources and resulting in his/her/their stigmatization and victimization.206
It is true with the electronic surveillance used in the organizational workplace that “where one party
systematically targets another party and exhibits repeated and persistent aggressive and hostile
behaviours towards the latter leading to his/her/their victimization.”207 We also experience here an
illegitimate use of power on the part of the authority, or in other words power imbalances between
employers/managers and employees and the consequent interpersonal bullying and de-personal
bullying.208 In this sense, some peculiar and atypical characteristics of workplace bullying are “target
orientation, persistence (including frequency and duration), escalation, harm, power disparity, and
intent.”209 That means that, in Indian organizational workplaces, employees experience being singled
out or stigmatized because of widespread and deeply target-oriented surveillance practices.
Cyber-bullying, as a newer form of workplace bullying, is a major issue an employee faces in the
environment of monitoring and information tracking. Cyber-bullying is defined as “the use of
information technology to harm or harass the people in a deliberate, repeated, and hostile manner.”210
It generally involves sending or posting harmful or cruel text and/or images on the internet or other
digital communication devices such as cell phones. It may occur on personal websites or be
transmitted via e-mail, social networking sites, chat rooms, message boards, instant messages, or cell
phones.211 It is also defined as a “wilful and repeated harm inflicted through the use of computers,
cell phones, and other electronic devices.”212 Employees may be threatened in multiple ways by
cyber-bullying. For instance, it may occur in online fights using electronic messages with angry and
vulgar language (flaming), in being made the subject of gossip or rumours meant to damage his or
her reputation or friendships (denigration), in having her secrets or embarrassing information or
images put online (outing), etc. These are frequently reported problems in the workplace today.213
205 D’Cruz, Workplace Bullying in India, xv. See also, Premilla D'Cruz, Megan Paull, Maryam Omari and
Burcu Guneri-Cangarli, “Target Experiences of Workplace Bullying: Insights from Australia, India and
Turkey,” Employee Relations 38, no. 5 (2016): 805-823. 206 D’Cruz, Workplace Bullying in India, xv. 207 D’Cruz, Workplace Bullying in India, xvi. 208 Tina K. Stephen, and Arun Sasi, “Analysis of Potential Legal Strategies for Mitigation of Workplace
Bullying in India,” Management and Labour Studies 42, no. 1 (2017): 20-38. 209 D’Cruz, Workplace Bullying in India, xvii. 210 Ted Feinberg and Nicole Robey, “Cyber-bullying: Intervention and Prevention Strategies,” National
Association of School Psychologists (NASP).
http://www.nasponline.org/resources/bullying/Cyberbullying.pdf [accessed December 8, 2013]. 211 Feinberg and Robey, “Cyber-bullying: Intervention and Prevention Strategies.”
http://www.nasponline.org/resources/bullying/Cyberbullying.pdf [accessed December 8, 2013]. 212 Sameer Hinduja and Justine Patchin, “Cyber-bullying,” Cyberbullying Research Center, 2010.
http://www.cyberbullying.us/Cyberbullying_Identification_Prevention_Response_Fact_Sheet.pdf [accessed
December 8, 2013]. 213 Del Siegle, “Cyberbullying and Sexting: Technology Abuses of the 21st Century,” Gifted Child Today 33,
no. 2 (2010): 15.
Workplace Surveillance and Privacy
120
They become a great threat to employees when all their activities and information are electronically
monitored either with or without their proper consent.
Workplace bullying and cyber-bullying are prominent examples of how surveillance can be corrupt.
A study on the Indian workplace context conducted by Premilla D’Cruz and Ernesto Noronha show
that employers, team leaders or even colleagues use various and multiple forms of technological
devices to harass workers.214 Employers, they observe, monitor workers continuously from their
desks, and thenuse instant text messaging, email, cell phone calls, computer software alerts, etc., to
send a continuous flow of questions and comments, often in the form of warnings or threats on the
performance of the worker – a trend of cyber-bullying at work.215 In their study, D’Cruz and Noronha
identify many cases of managers and other authorities having acquired the personal information of
employees, contacting employee and their families outside of work, threatening to post collected data
on social media websites or to make it known to other actual and potential employers. This can even
lead to physical threats on workers’ bodies.216 In the same manner, Winifred R. Poster in his research
on Indian call centres indicates how the targets of electronic and other forms of monitoring extend
far beyond workers’ physical movements and into their inner personal cores – their emotional states
and features of their identities.217 More in these two categories – bodily and emotional threats – will
be discussed in the next chapter.
In the same way, a study conducted by Abihijeet Singh Tomar et al. from the Management
Development Institute in Gurgaon, India, shows that monitoring does affect employees by limiting
productivity and efficiency and reducing commitment and trust towards the organization.Employees
“find it harsh enough to leave the organization for the breach of privacy at workplace due to
monitoring.”218 Likewise, systems of surveillance track employees’ positions in time and space and
expose employees who are ‘working hard’ and those who are ‘not pulling their weight’.219 Here,
individuals may come to be seen differently by themselves and by others. Moreover, “if employees
realize that their actions and communications are monitored, then their creative behaviour may be
reduced if they are worried about monitoring and judgement.”220 All these effects and consequences
require ethical evaluation.
3.3 EXPLORING THE TAXONOMY OF WORKPLACE (INFORMATIONAL) PRIVACY
Several researchers, including Hall Adams (2000), limit the scope of employees’ privacy in the
workplace, focusing on the idea of “reasonable expectation.” Adams states that such a reasonable
expectation of privacy in the workplace is not to be found, for several reasons: (1) the work is done
at the employer’s place of business; (2) the employer owns the equipment being used; (3) it is the
employer’s business being conducted through use of the equipment; (4) the employer has a strong
interest in monitoring employee activity to ensure quality and quantity of work; and (5) the employer
214 Premilla D’Cruz and Ernesto Noronha, “Navigating the Extended Reach: Target Experiences of
Cyberbullying at Work,” Information and Organization 23 (2013): 324-343. 215 D’Cruz and Ernesto Noronha, “Navigating the Extended Reach,” 324-343. See also, Winifred R. Poster,
“Socially Benevolent Workplace Surveillance?” Work in Progress: Sociology on the Economy, Work and
Inequality, April 30, 2015. https://workinprogress.oowsection.org/2015/04/30/socially-benevolent-
workplace-surveillance/ [accessed November 10, 2016]. 216 D’Cruz and Ernesto Noronha, “Navigating the Extended Reach,” 324-343. 217 Winifred R. Poster, “Who’s on the Line? Indian Call Centre Agents Pose as Americans for U.S.-Outsourced
Firms,” Industrial Relations 46, no. 2 (2007): 271-304. 218 Abihijeet Singh Tomar et al., “Workplace Monitoring in India,” RM Project: MDI Gurgaon, 2013, 18. 219 Sewell and Barker, “Coercion versus Care,” 939. 220 Ball, “Workplace Surveillance,” 93.
Workplace Surveillance and Privacy
121
has a right to protect his or her property against theft and fraud.221 This illustration seems to show
that though the right to privacy is generally expected to be protected for all people, when it comes to
the privacy of employees in a workplace context, fair application is not possible. However, Samantha
Lee and Brian H. Kleiner opine that since the work-life and private-life of employees cannot be
categorically separated, the privacy rights of these people must be considered and approved.222
Though generally theories of privacy “allude to privacy as a right of persons that is to provide
protection against interference by third parties into their private affairs [...] in terms of access and
control,”223 a few researchers, as noted, have identified notions of information or knowledge as
defining characteristics of privacy.224 Workplace privacy and the privacy of employees in particular
is therefore also defined in terms of “restrictions on access to, or control over, personal information,
and intrusions on privacy are defined as situations in which personal information is collected or
disseminated without consent of the individual who is the topic of this information.”225 So the
violation of privacy in the organizational workplace seems to concern both informational and
physical affairs.
Solove, in this regard, analyses various arguments concerning privacy and its advantages and takes
seriously the criticism that the concept of privacy is problematically subject to diverse meanings. He
likewise acknowledges that new technologies have given rise to an extensive collection of new
privacy harms. In his taxonomy of privacy, Solove identifies a wide range of privacy problems
coherently and comprehensively.226 In what follows, we will use Solove’s taxonomy to critically and
later ethically evaluate the excessive use of electronic surveillance in the workplace. The taxonomy,
as noted, indicates the principal types of harmful activities. We will apply these to privacy problems
that arise specifically in relation to surveillance in the workplace.227 Surveillance affects the basis of
self-determination and the self-identity of employees.
3.3.1 Information Collection and Privacy
Information collection, the first group in Solove’s taxonomy, often threatens privacy because it
creates disruption through the process of gathering data by surveillance and interrogation.
Surveillance, visual or audio, is viewed as troublesome insofar as it leads to a situation in which a
person feels uncomfortable and is led to alter his or her behaviour. Too much social control adversely
221 Hall Adams III, Suzanne M. Scheuing and Stacey A. Feeley, “E-mail monitoring in the workplace: The
good, the bad and the ugly,” Defense Counsel Journal 67, no. 1 (2000): 32-46. See also, Samantha Lee and
Brian H. Kleiner, “Electronic Surveillance in the Workplace,” Management Research News 26, nos. 2/3/4
(2003): 75. 222 Lee and Kleiner, “Electronic Surveillance in the Workplace,” 76. 223 Philip Brey, “The Importance of Workplace Privacy,” in The Ethics of Workplace Privacy, eds. Sven Ove
Hasson and Elin Palm (Brussels: P.I.E.-Peter Lang, 2005), 97-98. 224 Brey, “The Importance of Workplace Privacy,” 98. See also, C. Fried, “Privacy,” The Yale Law Journal 77,
no. 3 (1986): 475-493; W. Parent, “Privacy, Morality and the Law,” Philosophy and Public Affairs 12 (1983):
269-288. 225 Brey, “The Importance of Workplace Privacy,” 98. 226 Daniel J. Solove, “Taxonomy of Privacy,” University of Pennsylvania Law Review 154 (2006): 477-564.
There are four basic groups of harmful activities that follow in the taxonomy: information collection,
information processing, information dissemination, and invasion. The first group of activities includes
surveillance and interrogation for the collection of the information, while the second group consists of
aggregation, identification, insecurity, secondary use, and exclusion involves information processing. Then
comes the dissemination of information, which includes breach of confidentiality, disclosure, exposure,
increased accessibility, blackmail, appropriation, and distortion. The final group, termed invasion consists of
the intrusion and decisional interference. Solove, Understanding Privacy, 103-105. 227 This whole section will be examined by analysing the taxonomy model of privacy illustrated and
exemplified by Solove in his latest work ‘Understanding Privacy’. Cf. Daniel J. Solove, Understanding
Privacy (Cambridge: Harvard University Press, 2009), 101-170.
Workplace Surveillance and Privacy
122
impacts freedom, creativity and self-development.228 A sweeping form of investigatory power is a
system that records every behavioural pattern and potentially all social interactions, and thus exerts
a chilling effect on behaviour.229 In the context of the organizational workplace, different forms of
electronic surveillance impede the freedom of choice, impinge upon self-determination, and
demonstrate a lack of respect for the employee as an autonomous person. In the workplace, electronic
monitoring constrains the usual range of belief and behaviour, and thus “threatens not only to chill
the expression of eccentric individuality, but also, gradually, to dampen the force of our aspirations
to it.”230 Moreover, such surveillance discourages employees from associating with one another,
making some wary of speaking at meetings and the like.
As the watching, listening to, or recording of activities, surveillance can amount to a kind of
clandestine interrogation, according to Solove. It consists of various forms of questioning or probing
for information and often pressures employees to divulge this information in ways that impinge upon
their freedom of association and belief.231 In a workplace, though employees will be conscious of
interrogation, the compulsion to probe and search may make them uncomfortable. It also poses the
risk that the information acquired may be distorted. As a result, the compulsion and divulgence of
private information makes this kind of interrogation an invasion of the employee’s privacy in the
workplace. Monitoring affects an employee’s feelings, attitudes, emotions, beliefs, and norms
concerning both work and the workplace and can adversely affects an employee’s behaviour and
create “paced work, lack of involvement, reduced task variety [...], reduced peer social support [...],
fear of job loss, routine and lack of control over tasks.”232 It is also reported that monitored workers
experience “decreased job satisfaction and a decline in the quality of relationships with peers,
supervisors, and senior management.”233 In the same way, surveillance for reasons of mere personal
curiosity, which hurt an employee’s development or trust in the organization, cannot be legitimized
under any circumstances, as it abolishes the expectation that personal information will remain
private. Along with the assorted ways of collecting information, the way in which this data is handled
and disclosed also often threatens privacy. This possibility is discussed in the next two groups of the
taxonomy, called information processing and information dissemination.
3.3.2 Information Processing and Privacy
The process of using, storing, and manipulating data already collected is known as information
processing, which is discussed by Solove in five forms: aggregation, identification, insecurity,
secondary use, and exclusion. Solove writes,
Aggregation involves the combination of various pieces of data about a person. Identification is
linking information to particular individual. Insecurity involves carelessness in protecting stored
information from leaks and improper access. Secondary use is the use of collected information for
a purpose different from the use for which it was collected without the data subject’s consent.
228 Solove, Understanding Privacy, 108. 229 Solove, Understanding Privacy, 109. 230 Julie E. Cohen, “Examined Lives: Informational Privacy and the Subject as Object,” Stanford Law Review
52, no. 5 (2000): 1426. 231 Solove, Understanding Privacy, 113-114. 232 J.M Stanton and E. M. Weiss. “Electronic Monitoring in Their Own Words: An Explanatory Study of
Employee’s Experiences with New Types of Surveillance,” Computers in Human Behaviour 16 (2000): 424.
Effy Oz, et al., “Electronic Workplace Monitoring: What Employees Think,” Omega, The International
Journal of Management Science 27 (1999):168. 233 Oz, “Electronic Workplace Monitoring: What Employees Think,” 168.
Workplace Surveillance and Privacy
123
Exclusion concerns the failure to allow the data subject to know about the data that others have
about [him or] her and participate in its handling and use. 234
In a workplace, the consolidation and use of information collected through various methods of
electronic surveillance technologies raises a new and wide range of privacy issues. For example,
when some information is aggregated, it can reveal new facts about a person that he/she does not
wish to be divulged. The aggregation of data also increases the power of an employer over employees
by arming the employer with a dossier, by which employees are evaluated and judged. Identification,
positively taken, connects information to an individual and can prevent the rise of misleading factors.
However, in an organizational workplace it can also be used as a form of surveillance and thus
threaten privacy.235 For it is clear that in today’s work contexts, individuals as employees are less
able than ever before to control the quantitative and qualitative flow of data about themselves,
whether it be private or work-related.
The manipulation of information in the workplace also refers to the integration of information and
the possibility that it will be altered by electronic means and techniques. According to Britz, “The
main problems include the fact that the individual [employee] is not aware of personal information
being integrated into a central database, that the individual does not know the purpose/s for which
the integration is effected, or by whom or for whose benefit the new database is constructed and
whether the information is accurate.”236 This problem of insecurity, caused by the way in which any
information is collected, protected and processed, also carries the threat that negligence will lead to
potential future harms.237 Identity theft in the workplace could be a result of this feeling of insecurity
that in turn recognizes this insecurity as a threat to privacy. The secondary use of data, in the same
way, becomes problematic when information is used in ways to which a person has not consented,
and for Solove it “resembles breach of confidentiality in that there is a betrayal of the person’s
expectations when giving out information.”238 It is something like citing information out of context,
which can be misleading. Exclusion that fails to provide individuals with details about their records
exhibits a lack of transparency and creates a sense of vulnerability and uncertainty.239 Thus, in the
workplace information processing, which may adversely affect the privacy of the individual
employee by leaving him or her with a feeling of insecurity, negligence, and lack of confidentiality,
must be carefully attended to.
3.3.3 Information Dissemination and the Invasion of Privacy
Information dissemination consists of revealing or threatening to reveal personal information. This
can include the breach of confidentiality, disclosure, exposure, undue accessibility, blackmail,
appropriation, and distortion.240 In any form, it ultimately breaks trust in a relationship, while the
234 Solove, Understanding Privacy, 117. 235 Solove, Understanding Privacy, 125. 236 J.J. Britz, “Technology as a Threat to Privacy: Ethical Challenges and Guidelines for the Information
Professionals,” Microcomputers for Information Management 13, no. 3-4 (1996): 178. 237 Solove, Understanding Privacy, 127. 238 Solove, Understanding Privacy, 131. 239 Solove, Understanding Privacy, 134. 240 Solove, Understanding Privacy, 136. Solove offers through explanations of these forms in his taxonomy.
“Breach of confidentiality is breaking a promise to keep a person’s information confidential. Disclosure
involves the revelation of truthful information about a person that affects the way others judge her reputation.
Exposure involves revealing another’s nudity, grief, or bodily functions. Increased accessibility is amplifying
the accessibility of information. Blackmail is the threat to disclose personal information. Appropriation
involves the use of the data subject’s identity to serve another’s aims and interests. Distortion consists of
disseminating false or misleading information about individuals.” Solove, Understanding Privacy, 105.
Workplace Surveillance and Privacy
124
unauthorised and unwanted disclosure of information may damage one’s personal, emotional, and
financial reputation.241 In a workplace, electronic surveillance often adversely affects employees.
While trust is essential for all sorts of business transactions, it has been argued that surveillance
becomes “an expression of distrust, and, worse, continued surveillance may make it hard, or
impossible, to establish trusting relationships.”242 The disclosure of certain information in the
workplace can also inhibit people from associating with each other and compromise anonymity.
Moreover, when surveillance is viewed by an employee as expressing a lack of trust, it becomes
more harmful to the functioning of the organization than the expected advantages of surveillance. In
the same way, the exposed physical and emotional attributes of a person often create embarrassment
and humiliation, because it is primarily related to his or her body and health.243 Today, the internet
makes a wide range of information easily accessible.
For Solove, blackmail is prohibited not only in order to limit disclosure, but also to prevent the threat
of disclosure from being used as a tool for exerting power and domination over others.244 Two
significant ways in which information dissemination can harm employees are, according to Muller:
(1) by disseminating evidences of present or past actions or associations to a wider audience than
the individual consented to or anticipated when he originally surrendered the information
(deprivation of control over access), and (2) by introducing factual or contextual inaccuracies in
the data that create an erroneous impression of the subject’s actual conduct or achievements in the
minds of those to whom the information is exposed (deprivation of control over accuracy).245
Therefore, losing control over access to one’s information and inaccurate disclosure of the same are
two dangers that damage individual privacy. The effect of information manipulation in the workplace
due to disclosure can be called a loss of dignity and spontaneity and a threat to one’s freedom and
right to privacy. Similarly, the final group of the taxonomy, comprising physical invasion and
decisional interference, also undoubtedly reflects the marked recent increase in assaults on privacy.
For Moore, the downside of the revolution of digital technology surveillance, in the workplace in
particular, has been tedious working conditions and a loss of privacy and autonomy.246 Apart from
informational assault, as Solove highlights, some activities involve invasions into one’s private
affairs that may disturb one’s tranquillity or solitude impede his or her decision-making process.247
For Botan and Vorvoreanu, the diminishment of personal privacy is probably the most ethically
important panoptic effects of surveillance because “it infringes upon the human right to a private
identity and the decision-making autonomy based on it.”248 In order to live a life according to one’s
decision and design, an individual requires an unobserved space, the lack of which becomes an
expression of lack of respect for his or her wishes and needs.249 In the same way, computer
programmes that enable employers to monitor and record every keystroke and employee badges that
241 Solove, Understanding Privacy, 142. 242 Bernd Carsten Stahl et al., “Electronic Monitoring in the Workplace: If people Don’t care, Then What is the
Relevance?” 67. 243 Solove, Understanding Privacy, 147. 244 Solove, Understanding Privacy, 153. 245 Miller, The Assault on Privacy, 26. 246 Adam D. Moore, “Employee Monitoring and Computer Technology: Evaluative Surveillance v. Privacy,”
Business Ethics Quarterly 10, no. 3 (2000): 697. 247 Solove, Understanding Privacy, 104. 248 Carl Botan and Mihaela Vorvoreanu, “What Do Employees Think about Electronic surveillance at Work?”
in Electronic Monitoring in the Workplace: Controversies and Solutions, ed. John Weckert (Hershey: Idea
Group Publishing, 2005), 130. 249 Stahl et al., “Electronic Monitoring in the Workplace,” 67.
Workplace Surveillance and Privacy
125
allow the recording of every movement and time spent in various locations in the workplace clearly
violate both physical and informational privacy.
Zirkle and Staples write: “[T]hese new meticulous rituals of power often appear as the technological
progeny of the ‘Panopticon’ in that they often operate in a hidden or random fashion, leaving those
under their scrutiny supposedly internalizing the ‘gaze’ of the authorities and thus rendering
themselves docile.”250 Since this technological sophistication has given the employer added power
and control over both employees and the workplace, the fundamental uncertainty about the privacy
rights of employees is also quickly amplified and employees may become merely submissive
occupants of an employer-determined power system. Arthur R. Miller observed this a few decades
back, when he wrote that “when an individual is deprived of control over the spigot that governs the
flow of information pertaining to him, in some measure he becomes subservient to those people and
institutions that are able to manipulate it.”251 Thus, monitoring and keeping track of every movement
has implications for the privacy rights of workers and threatens to lead to the dehumanization and
deskilling of work. For these reasons, privacy appears as a value able to protect the individual against
all types of harms of abuses of power in the workplace. However, the increasing sophistication in
ICT, with its capacity to collect, analyse and disseminate various types of data simultaneously its
widespread implementation in workplaces, has introduced an urgent demand for privacy
legislation.252 However, it is significant to discuss the General Data Protection Regulation (GDPR)
of European Union that deals with data protection of all its citizens.
3.3.4 The General Data Protection Regulation (GDPR) and Data Privacy
How might the GDPR253 inform our perspective on the processing of personal data and data
protection in an employment context? The GDPR does not protect employees from any particular
data subject.254 However, it does affirm the importance of individual rights in the workplace and
prohibits processing sensitive data in the labour field. The GDPR offers an example of how
acceptable legal structures could be developed to achieve a more acceptable balance between the use
of electronic surveillance systems and technologies in the workplace and employee privacy and data
protection. Its aim is to protect citizens from privacy invasions and data breaches. The GDPR
incorporates several fundamental principles, including transparency and fairness, guarantees specific
rights to individuals, and warrants the exercise of those rights by organizations.255 It legally entitles
employers to monitor employees, but on condition that employees grant consent through advance
communication.256 The GDPR thus ensures the legitimate collection and processing of personal data
as well as its limitation and protection. It is designed to protect the personal data of individuals,
250 Brian L. Zirkle and William G. Staples, “Negotiating Workplace Surveillance,” in Electronic Monitoring
in the Workplace: Controversies and Solutions, ed. John Weckert (Hershey: Idea Group Publishing, 2005),
80. 251 Miller, The Assault on Privacy, 25. 252 Nivedita Debnath and Kanika T. Bhal, “Polarization of Perceptions of IT-enabled Privacy Violations at
Workplace: Impact of Respondent Position, Peer Belief and Peer Pressure,” Global Journal of Flexible
Systems Management 4, no. 3 (2003): 16. 253 The General Data Protection Regulation (GDPR), as we have mentioned at the first section of this chapter,
is a European Union regulation to protect the personal data of its individuals. It is the new data protection
regulation from the EU, released in May 2016 and implemented on May 25, 2018 and this regulation replaces
the 20-year-old Directive 95/46/EC. 254 Ogriseg, “GDPR and Personal Data Protection in the Employment Context,” 10. 255 European Parliament, “General Data Protection Regulation,” Official Journal of the European Union, May
5, 2016. http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679 [accessed October
5 28, 2018]. 256 Claudia Ogriseg, “GDPR and Personal Data Protection in the Employment Context,” Labour & Law Issues
3, no. 2 (2017): 1-24.
Workplace Surveillance and Privacy
126
though it also applies to data control and processing and related activities.257 In order for the interests
of employers to process employee data to qualify as legitimate and legal, the employer must balance
the interests, rights and freedoms of employees.258 Likewise, the GDPR enables employers to
establish compelling legitimate grounds to process data. It is argued, however, that the imbalance of
power in organizations and in the employer-employee relationship makes it difficult to rely on
employee consent to collect and process the data.259 For under such conditions, the legitimate
interests of the employer or the data controller emerge as the deciding factor in an organizational
context. In the same way, consent may be given unwillingly when employees face a potential
negative effect from withholding consent.
Chapter II of the GDPR in Article 1 (a) guarantees that personal data shall be processed lawfully,
fairly and in a transparent manner (fulfilling specific requirements by securing the data subject’s
consent or by another legitimate means prescribed by law or the legitimate interests pursued by the
controller).260 This makes clear that the GDPR regards the lawfulness, fairness and transparency of
data processing as of vital importance. Article 1 (b) states that personal data shall be collected only
for specified, explicit and legitimate purposes and that the data collected should not be further
processed if not compatible with those purposes (purpose limitation).261 It also seeks “data
minimisation” in Article 1 (c), where data shall be “adequate, relevant and limited to what is
necessary in relation to the purposes for which they are processed.”262 This principle of data
minimisation is significant in the DGPR, given that frequent data collection for multiple reasons and
treatments is alarmingly on the rise in the domain of digital transformation and data exchange.263
Moreover, according to Articles 6 and 7, data controllers must perform an analysis and risk
assessment (physical, logical and organizational) to ensure that the data to be collected is adequate,
relevant, limited, accurate (inaccurate data must be rectified), and not stored beyond a reasonable
date.264 The values of confidentiality (against accidental loss, destruction or damage) and
accountability (controller responsibility) are similarly ensured by the GDPR.265 The GDPR also
provides tools to guarantee that data subjects are free to decide upon which of their personal data can
be collected and processed to define their “personal identity,”266 and thus secures the rights of data
subjects to receive transparent information and communication (Articles 12-15).
Article 16 provides data subjects the right to rectify inaccurate personal data.267 It also guarantees the
right to erasure when the collected data is no longer necessary in relation to the purpose for which it
257 Bernadette John, “Are You Ready for General Data Protection Regulation?” BMJ 360:k941 (2018): 1;
Ogriseg, “GDPR and Personal Data Protection in the Employment Context,” 7-8. 258 Mira Burri and Rahel Schär, “The Reform of the EU Data Protection Framework: Outlining Key Changes
and Assessing Their Fitness for a Data-Driven Economy,” Journal of Information Policy 6 (2016): 479-511. 259 Michelle Goddard, “The EU General Data Protection (GDPR): European Regulation That Has a Global
Impact,” International Journal of Market Research 59, no. 6 (2017): 703-705. 260 General Data Protection Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/35;
Goddard, “The EU General Data Protection (GDPR): European Regulation That Has a Global Impact,” 704. 261 General Data Protection Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/35.
See also, Ogriseg, “GDPR and Personal Data Protection in the Employment Context,” 8; Goddard, “The EU
General Data Protection (GDPR): European Regulation That Has a Global Impact,” 703-704. 262 General Data Protection Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/35. 263 Ogriseg, “GDPR and Personal Data Protection in the Employment Context,” 8. 264 General Data Protection Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/35.
See also, Ogriseg, “GDPR and Personal Data Protection in the Employment Context,” 8. 265 General Data Protection Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/36. 266 Ogriseg, “GDPR and Personal Data Protection in the Employment Context,” 9; General Data Protection
Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/41-43. 267 General Data Protection Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/43-
44.
Workplace Surveillance and Privacy
127
was collected or processed. If data is collected unlawfully, the data subject may withdraw consent
on how that data is processed. It also includes a right to restriction of data processing (Article 18), a
right to data portability (Article 20), and a right to automated individual decision-making (Article
21).268 This automated individual decision-making includes profiling. The GDPR strengthens and
confirms the freedom and rights of data subjects, the right to live without arbitrary and unwarranted
interference, intrusion or limitation, and thus the right to individual profiling.269 As a continuation of
this, Article 35 treats any excessive use of electronic monitoring (such as CCTV monitoring) to
profile employees as “high risk” profiling. According to this article, excessive electronic surveillance
results in a high risk to the rights and freedoms of natural persons. Such profiling further requires a
Data Protection Impact Assessment (DPIA) to demonstrate the need for and proportionality of the
employer’s interests in seeking employee data.270 For instance, Article 35 (1) states that “where a
type of [data] processing, in particular using new technologies, and taking into account the nature,
scope, context and purposes of the processing, is likely to result in a high risk to the rights and
freedoms of natural persons, the controller shall, prior to the processing, carry out an assessment of
the impact of the envisaged processing operations on the protection of personal data.”271 Given this
requirement of a systematic and extensive evaluation of personal aspects, it is clear that the rights
and freedom of natural persons are highly valued by the GDPR.
Articles 45-50 outline legal measures for transferring personal data to a third-party, whether to
countries or to national or international organizations.272 Article 45 (1) speaks about data transfers
on the basis of an adequacy decision, ensuring that the third-party will provide an adequate level of
protection for the data. This adequacy level is determined by several factors, including the rule of
law, respect for human rights and fundamental freedoms, relevant general and sectoral legislation,
public security, etc. Articles 46 and 47 state, respectively, that a data controller or processor may
transfer the data subject to appropriate safeguards and that this should be done by means of binding
corporate rules. However, according to Article 49, when the adequacy decision and binding corporate
rules are absent, the explicit consent of the data subject must be obtained for any data transfer. Based
on the preceding elaborations of the GDPR, employee monitoring has to be in compliance mainly
with the principles of data protection, including, as already discussed, lawful and fair processing,
transparency, purpose limitation and necessity (data minimization), proportionality, integrity and
confidentiality.273 Providing adequate protection of personal data in a work context is among the
safeguards meant to ensure the privacy of employees.274 Within the workplace context, the employer
is classified as a data controller with regard to its employees’ personal data. For this reason,
applicable data protection rules are directly relevant to workplace privacy. However, we have already
noted concerns over the legitimate interests and practice of data protection.
The indicated ambiguity of the data subject’s consent – whether it is freely given, with full
knowledge, with specificity, based on prior information, etc., along with the nature of the relationship
between employer and employee – puts in question the legitimacy of employee monitoring and data
268 General Data Protection Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/44-
45. 269 General Data Protection Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/51;
Burri and Schär, “The Reform of the EU Data Protection Framework,” 491. 270 General Data Protection Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/53;
Burri and Schär, “The Reform of the EU Data Protection Framework,” 494. 271 General Data Protection Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/53. 272 General Data Protection Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/60-
65. 273 Goddard, “The EU General Data Protection (GDPR): European Regulation That Has a Global Impact,” 704. 274 Seda Gürses and Jose M. del Alamo, “Privacy Engineering: Shaping an Emerging Field of Research and
Practice,” IEEE Security & Privacy 14, no. 2 (2016): 41.
Workplace Surveillance and Privacy
128
processing.275 The nature of the data to be processed also matters, having adverse effects on
employees, when it comes to highly sensitive and confidential data about an individual employee. It
is also needed to establish the impact of monitoring on employees, including individual risks and
concerns (privacy related, identity manipulation) as well as social ones (power distance,
discrimination). The GDPR (Recital 75) in this regard provides a list of possible risks in data
processing and managing:
The risk to the rights and freedoms of natural persons, of varying likelihood and severity, may
result from personal data processing which could lead to physical, material or non-material
damage, in particular: where the processing may give rise to discrimination, identity theft or fraud,
financial loss, damage to the reputation, loss of confidentiality of personal data protected by
professional secrecy, unauthorised reversal of pseudonymisation, or any other significant
economic or social disadvantage; where data subjects might be deprived of their rights and
freedoms or prevented from exercising control over their personal data; where personal data are
processed which reveal racial or ethnic origin, political opinions, religion or philosophical beliefs,
trade union membership, and the processing of genetic data, data concerning health or data
concerning sex life or criminal convictions and offences or related security measures; where
personal aspects are evaluated, in particular analysing or predicting aspects concerning
performance at work, economic situation, health, personal preferences or interests, reliability or
behaviour, location or movements, in order to create or use personal profiles; where personal data
of vulnerable natural persons, in particular of children, are processed; or where processing
involves a large amount of personal data and affects a large number of data subjects.276
Therefore, any assessment of the impact of employees’ data monitoring requires an assessment of
these risks and their applicability to the proposed monitoring. A key contribution of the GDPR in
employee monitoring is that “it marks a fundamental change in the balance of power between
organisations and individuals in the collection, processing and storage of personal data elevating
individuals’ right to access and control use of their personal data.”277 With the advent of the GDPR
as law, rather than merely a recommendation, the notion of a right to privacy in the context of data
is particularly well-defined. Now, the question is about the correlation between the data protection
principles noted above and their relative weight in balancing employees’ rights to privacy and
freedom with employers’ legitimate interests. This has to be further researched based on other
potential and actual impacts of these practices on both employers and employees.
In this regard, what constitutes “private matter” for a typical employee in India, and what concessions
an employee in this regard an employee might have to make as an organizational member, are two
major concerns of privacy in the Indian context. Given the lack of legal systems to generate a generic
cause of employee privacy, this makes clear the need for general organizational policies that support
and value employee privacy. The following section includes some recommendations concerning data
privacy based on a proposed privacy act in India.
275 Goddard, “The EU General Data Protection (GDPR): European Regulation That Has a Global Impact,” 704.
It is to be noted in this regard the notion of “notice and choice” stated by Daniel Solove. For him the important
component of privacy management is the adequate informtion given to the individual (notice) about the data
collected and used as well as allowing him or her to decide whether they accept (choice) this data collection
and use. Daniel J. Solove, “Introduction: Privacy Self-Management and the Consent Dilemma,” Harvard Law
Review 126, no. 7 (2013): 1883. 276 General Data Protection Regulation, Official Journal of the European Union (L 119) 59 (2016): L119/15. 277 Goddard, “The EU General Data Protection (GDPR): European Regulation That Has a Global Impact,” 705.
Workplace Surveillance and Privacy
129
3.3.5 Recommendations for a Leading Data Privacy
The Planning Commission of India is a group of experts under the chairmanship of former Chief
Justice Ajit Prkash Shah, tasked with identifying privacy issues in the private and public spheres in
relation to several national or state level programmes implemented through ICT platforms. They then
prepared a document to facilitate the proposed Privacy Act.278 The recommendations of this
committee are framed around nine national privacy principles, which we will explain briefly here.279
The committee acknowledges that:
At the moment there is no overarching policy speaking to the collection of information by the
government. This has led to ambiguity over who is allowed to collect data, what data can be
collected, what are the rights of the individual, and how the right to privacy will be protected. The
extent of personal information being held by various service providers, and especially the
enhanced potential for convergence that digitization carries with it is a matter that raises issues
about privacy.280
Today, data flows rapidly and globally, as any transaction initiated on the internet simultaneously
causes multiple data flows and transfers via the phenomenon of so-called Web 2.0, including online
social networking, search engines, and cloud computing.281 These data flows occur more recurrently
in organizational workplaces in India, as they make extensive use of all these information
technologies in their normal functioning, and especially make use of employee monitoring
technologies. This shows that the present ubiquitous nature of global data transfer through computer-
mediated internet networking exposes individuals to more privacy risks. As we read in the report:
While this is exposing individuals to more privacy risks, it is also challenging businesses which
are collecting the data directly entered by users, or through their actions without their knowledge,
- e.g. web surfing, e-banking or e-commerce - and correlating the same through more advanced
analytic tools to generate economic value out of data. The latter are accountable for data collection
and its use, since data has become one of the drivers of the knowledge-based society which is
becoming even more critical to business than capital and labour.282
The data exposed could be manipulated in various ways, taking it out of context and using it for
further demands. Acknowledging this possibility of both data flow and data manipulation and in
agreement with the various international privacy protection principles,283 the privacy
278 Some of the present National Programmes that raises privacy concerns are: Unique Identification number
issued by the Unique Identification Authority of India (UIDAI) that collect the biometric and demographic
data of its citizens and store them in a centralized database and is identified with a twelve digit number
(Aadhar), NATGRID (The National Intelligence Grid is the integrated intelligence grid connecting databases
of core security agencies of the Government of India), DNA profiling, Reproductive Rights of Women,
Privileged communications and brain mapping, etc. 279 Ajit Prakash Shah, “Report of the Group of Experts on Privacy,” Planning Commission, Government of
India, October 16, 2012. http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf [accessed
November 10, 2016]. 280 Shah, “Report of the Group of Experts on Privacy,” 3. 281 Shah, “Report of the Group of Experts on Privacy,” 3. 282 Shah, “Report of the Group of Experts on Privacy,” 3. 283 Chapter two of the Report of the Group of Experts on Privacy entitled International Privacy Principles,
illustrate the international privacy requirements articulated by the OECD Privacy Guidelines (United States’
Organization for Economic Cooperation and Development), EU Data Protection Directives, APEC Privacy
Framework (Asia-Pacific Economic Cooperation), Canada PIPEDA (Personal Information Protection and
Electronic Documents Act), and Australia ANPP (Australia National Privacy Principles). Shah, “Report of
the Group of Experts on Privacy,” 10-20. Indian Data Privacy Protection recommendations are in line with
these international principles, that: “Privacy Principles such as Notice, Consent, Collection Limitation, Use
Workplace Surveillance and Privacy
130
recommendation committee enumerates a set of National Privacy Principles that can best be
implemented in Indian conditions and that safeguard “procedures over the collection, processing,
storage, retention, access, disclosure, destruction, and anonymization of sensitive personal
information, personal identifiable information, sharing, transfer, and identifiable information.”284
The proposed privacy principles are: the Principle of Notice; the Principle of Choice and Consent;
the Principle of Collection Limitation; the Principle of Purpose Limitation; the Principle of Access
and Correction; the Principle of Disclosure of Information; the Principle of Security; the Principle of
Openness; and the Principle of Accountability.285 Let us consider each briefly.
The first two principles, the principle of notice and the principle of choice and consent, deal with the
need for prior information when dealing with any data concerning individuals.286 Before the
collection of any personal data, proper information should be given and the person in question should
be notified of the relevant information practices. This concerns what data is collected, for what
purpose, whether or not or to what extent data will be disclosed to a third party, and notifying
individuals when personal data is breached. The rationale behind this principle is that “the notice
principle ensures that individuals are informed of how their information will be used, allows data
controllers to communicate their intents and practices to data subjects and other stakeholders, and
allows the individual to hold the data controller accountable to the practices articulated in the
notice.”287 In the same way, individuals should be given the choice to opt-in or opt-out of disclosing
their data and the data controller should secure the consent of the person concerned.288 The rationale
behind this principle explains that:
The choice and informed consent principle empowers the individual to approve and authorise
collection and usage of personal information for defined purposes. The principle ensures that data
controllers provide simple choices to data subjects that allow them to make informed decisions
about the extent to which they would like to share their personal information, prior to collecting
that information. When individuals are mandated by law to share information, the principle
ensures that this is done in accordance with the other National Privacy Principles, and that the
information, if shared in public databases, is not retained in an identifiable form longer than is
necessary.289
The third and fourth principles concern limiting the amount of data collected and ensuring it is done
for a clear and proper purpose. The collection of personal information from data subjects should be
strictly limited - collection limitation - according to the purposes identified for such collection and
should be always adequate and relevant to the purposes - purpose limitation - for which they are
Limitation, Access and Corrections, Security/Safeguards, and Openness cut across these frameworks. The
principle of Enforcement, which APEC calls as Preventing Harm, is introduced by APEC, EU and the
Canadian privacy enforcement regimes. The EU Data Protection Directive, OECD Guidelines and APEC
framework additionally deals with the subject of Trans-border data flow. Australia’s ANPP specifically
prescribes de-identification of the personal information.” Shah, “Report of the Group of Experts on Privacy,”
10. 284 Shah, “Report of the Group of Experts on Privacy,” 21. 285 Shah, “Report of the Group of Experts on Privacy,” 21-27. 286 Shah, “Report of the Group of Experts on Privacy,” 21-22. For further elaboration on notice and consent:
Fred H. Cate and Viktor Mayer-Schönberger, “Notice and Consent in a World of Big Data,” International
Data Privacy Law 3 no. 2 (2013): 67-73; Richard Warner and Robert Sloan, “Beyond Notice and Choice:
Privacy, Norms, and Consent,” Journal of High Technology Law (2013): 1-34. 287 Shah, “Report of the Group of Experts on Privacy,” 22. 288 Shah, “Report of the Group of Experts on Privacy,” 22-23. 289 Shah, “Report of the Group of Experts on Privacy,” 23. It also further ensures to keep the data accurate,
complete, current and reliable for its intended use. This is discussed next. In the same way, the accuracy of
the data is important to verify the enforced security, accountability and accessibility.
Workplace Surveillance and Privacy
131
processed. Notice should be provided concerning both collection and purpose and consent from the
individual secured.290 The committee makes clear that “the collection limitation principle ensures
that data controllers only collect personal information that is necessary for achieving the stated
objective, and that all collection is lawful and fair,” and hope that “this reduces the probability of
misuse of individuals’ personal information.”291 Besides, the purpose limitation principle
additionally ensures that “personal information is used only in compliance with the National Privacy
Principles and only for intended and agreed purposes [... and] that personal information is retained
by the data controller only as long as is necessary to fulfill the stated purposes.”292 This personal data
or information, when it is no longer required, is to be destroyed in accordance with identified
procedures.293
Fifth, the principle of access and correction states that individuals should have the right to access
their personal information and make necessary corrections, additions or deletion if needed.294 The
rationale behind this access and correction principle is that it “ensures that data controllers provide
access mechanisms to data subjects for inquiring if a data controller is holding their personal data,
and for viewing, modifying and deleting their personal information.”295 Sixth, the principle of
disclosure of information prohibits the data controller from disclosing personal data to third parties
without informed consent. This principle ensures that:
[D]ata subjects are informed and consent taken [except when an exemption exists] when their
personal information is transferred to third parties. The principle requires data controllers ensure
that third parties also adhere to the National Privacy Principles. The principle also ensures that
any disclosure by the data controller to a third party that has been authorized and is a governmental
agency is in compliance with the National Privacy Principles. Furthermore, the principle makes
any de-anonymization of information that was anonymised/aggregate information for the transfer
a violation of the principle.296
The seventh principle of security deals with the security of personal data while held in the custody
of the data controller. It aims to ensure that “data controllers put in place the necessary technical,
administrative, and physical safeguards for protecting personal information in their custody from
unauthorised use, destruction, modification, access, and retention etc. – both from insiders and
outsiders.”297 Eighth, the principle of openness calls for practices, procedures, policies and systems
to be implemented in proportion to the sensitivity of the data, and thus for the information to be made
available in an intelligible form.298 The final principle of accountability correspondingly states that
the data controller or overseeing body shall be accountable or responsible for complying with these
290 Shah, “Report of the Group of Experts on Privacy,” 24. 291 Shah, “Report of the Group of Experts on Privacy,” 24. 292 Shah, “Report of the Group of Experts on Privacy,” 24. It ensures that obtaining personal data from a data
subject must be of specific, lawful and clearly stated purposes. Collecting and processing data routinely and
indiscriminately goes against the identified norms of legitimate purpose. The processing must be in
compatible with the original purpose(s). 293 Shah, “Report of the Group of Experts on Privacy,” 24. See also, Jaspreet Bhatia and Travis D. Breaux, “A
Data Purpose Case Study of Privacy Policies,” Proceedings of the International Requirements Engineering
Conference. IEEE Computer Society, 2017, 394-399; Nikolaus Forgó, Stafanie Hänold and Benjamin
Schütze, “The Principle of Purpose Limitation and Big Data,” in New Technology, Big Data and the Law,
eds. Marcelo Corrales, Mark Fenwick and Nikolaus Forgó (Singapore: Springer, 2017), 17-42. 294 Shah, “Report of the Group of Experts on Privacy,” 25. 295 Shah, “Report of the Group of Experts on Privacy,” 25. 296 Shah, “Report of the Group of Experts on Privacy,” 25. See also, Yuriko Haga, “Right to be Forgotten: A
new Privacy Right in the Era of Internet,” in New Technology, Big Data and the Law, eds. Marcelo Corrales,
Mark Fenwick and Nikolaus Forgó (Singapore: Springer, 2017), 97-126. 297 Shah, “Report of the Group of Experts on Privacy,” 26. 298 Shah, “Report of the Group of Experts on Privacy,” 26.
Workplace Surveillance and Privacy
132
privacy principles.299 In short, it is recommended that these national privacy principles be applied to
cases of interception of communications, access to data and audio/video and other electronic
recording in different areas of citizens’ work and life in India.
The previous chapter (chapter one) mentioned the Personal Data Protection Bill of 2018, which
concerns data protection and privacy across India.300 This Bill considers the laissez-faire approach
of the US legal framework, Canada’s Personal Information Protection and Electronic Documents Act
(PIPEDA), and the EU’s focus on individual privacy and data protection (GDPR), and in view of all
these adopts a comprehensive data protection law.301 Yet the Bill takes a specifically Indian approach
by establishing, on the one hand, the role of the State to protect the common good, while on the other
guaranteeing an enforceable framework for the individual right to privacy. It recognizes the right to
privacy as a fundamental right and the need to protect personal data as an essential facet of
informational privacy. The Bill establishes legal requirements for the collection and processing of
personal data and limits the processing of sensitive personal data as well as the period of its
retention.302 The data protection obligations stated in the second chapter of this Bill explicate this
further. For instance, Article 4 guarantees a fair and reasonable processing of data, respecting the
privacy of the data subject, or data principal.303 For data collection and processing, the Bill includes
a purpose limitation (clear, specific and lawful - Article 5) and a collection limitation (limited and
necessary – Article 6). In the same way, the data fiduciary is obliged to provide the data principal
with adequate notice prior to the collection of personal data (Article 8). The Bill also requires that
data processing be of a certain quality (complete, accurate, not misleading – Article 9), that data
storage be limited (Article 10), and accountability on the part of those conducting this data processing
(Article 11).304
The Bill guarantees that organizations designate a Data Protection Officer and conduct a third-party
audit of the processing of personal data (Article 36). It assures that security safeguards will be
implemented, including (where appropriate) de-identification and encryption, as well as safeguards
to prevent misuse, unauthorized access to, modification, disclosure or destruction of personal data.305
The Bill would also require regulator notification of any data breach (Article 32 (1-7)).306 Along with
299 Shah, “Report of the Group of Experts on Privacy,” 27. 300 The initial form of this Personal Data Protection Bill, 2018 could be found in the Privacy (Protection) Bill,
2013 proposed by the Centre for Internet and Society. Though this Bill of 2013 does not provide any definition
on privacy, it focuses on the protection of sensitive personal data of persons. The Centre for Internet &
Society, “The Personal Data (Protection) Bill, 2013,” https://cis-india.org/internet-governance/blog/the-
personal-data-protection-bill-2013 [accessed October 16, 2018]; Vishalashi Singh, “An Analysis of Personal
Data Protection with Special Emphasis on Current Amendments and Privacy Bill,” International Journal of
Law and Legal Jurisprudence Studies 4, no. 1 (2017): 144-152. 301 Amba Kak, “The Emergence of the Personal Data Protection Bill, 2018 - A Critique,” Economic & Political
Weekly 53, no. 38 (2018): 12-16. Nishith Desai Associates, “New Data Protection Law Porposed in India!
Flavors of GDPR,” July 30, 2018, http://www.nishithdesai.com/fileadmin/user_upload/pdfs/NDA_
Summary.pdf [accessed October 16, 2018]. 302 The sensitive personal data includes personal data revealing or relating to password, financial data, health
data, official identifier, sex life, sexual orientation, biometric data, genetic data, transgender status, intersex
status, caste or tribe. This broad definition of sensitive personal data that includes passwords and financial
data is a landmark step taken in this Bill and thus marks its distinction from other international data protection
laws. The Personal Data Protection Bill 2018, Article 3 (35). 303 The Personal Data Protection Bill 2018, Article 4. 304 The Personal Data Protection Bill 2018, Articles 5-11. 305 The Noncompliance of the organizations and of individuals concerned with the Bill would result in penalties
up to 50 million Rupees (approximately USD $728,000), or two percent of global annual turnover of the
preceding financial year, whichever is higher. 306 Article 3 (30) defines persona data breach as “any unauthorised or accidental disclosure, acquisition,
sharing, use, alteration, destruction, loss of access to, of personal data that compromises the confidentiality,
Workplace Surveillance and Privacy
133
the wide definition of sensitive personal data, the Bill guarantees data localization (Article 40). Every
data fiduciary is required to store a copy of personal data on a server or data centre located within
the territory of India. This will restrict the global transfer of the data. It is also to be noted here that
the core concepts of the EU’s GDPR, discussed above, is reflected in this proposed Personal Data
Protection Bill of 2018 (PDPB). For instance, the core principles of data protection in the GDPR,
namely lawfulness, fairness and transparency, purpose limitation, collection and storage limitation,
accountability, etc., are all a part of the proposed PDPB as well. Similarly, one can compare the
GDPR and PDPB in terms of the rights of data subjects, such as a right to correction, confirmation
and access, a right to portability, and a right to be forgotten. There is also a development in the PDPB:
namely that a clearer legal ground of personal data processing in relation to employment is
guaranteed while this is left not very explicit in the GDPR. A few more observations based on the
previous analysis of the taxonomy of privacy and surveillance in the workplace are in order, however,
for a complete and comprehensive understanding of these issues.
3.4 WORKPLACE SURVEILLANCE AND INDIVIDUAL RIGHTS PERSPECTIVE
Electronic surveillance in the workplace has ethical implications related to the privacy expectations
of employees, fairness and employees’ quality of work life, which may be affected by anxiety and
stress-related illnesses. According to Miller and Weckert, “possibly the greatest threat to privacy is
posed by the possibility of combining these new technologies and specifically combining the use of
monitoring and surveillance devices with certain computer software and computer networks,
including the internet.”307 In this regard, analysis of the taxonomy of privacy can help us appreciate
the amount and kind of personal information that can be gathered and how long it can be retained. It
is clear by now that the “new technologies have ushered in many ways to overhear, watch, or read
just about anything in the workplace.”308 In the workplace, privacy violations involving information
collection and dissemination are known respectively as snooping and exposure, while a physical
invasion of privacy is known as a disturbance.309 Taking into account these facts, it is clear that
privacy intrusion in the workplace may take the form of unauthorized cognitive or physical access
or informed consent. Thus, privacy, at its accessible, decisional, and informational levels, has to be
protected in the organizational workplace to ensure the productive functioning of that workplace.
At this stage, it should be clearly noted that “the basic attribute of an effective right of privacy is the
individual’s ability to control the circulation of information relating to him – a power that often is
essential to maintaining social relationships and personal freedom.”310 Camera surveillance in the
workplace reveals private information about the bodies or bodily condition of employees. When this
surveillance takes place in more private environments, such as offices, restrooms and comfort zones,
it invades privacy. Background checks on prospective employees through the internet and electronic
integrity or availability of personal data to a data principal.” The Personal Data Protection Bill, 2018, Article
3 (30). Daniel J. Solove and Danielle Keats Citron write about the problem of data breaches and the
confounded issue of harm related to it. They speak in relation to data breaches creating a risk of future injury,
such as identity theft, fraud, or damaged reputations. According to them people expirience anxiety about this
risk. Daniel J. Solove and Danielle Keats Citron, “Risk and Anxiety: A Theory of Data-Breach Harms,” Texas
Law Review 96 (2018): 737-786. 307 Seumas Miller and John Weckert, “Privacy, the Workplace and the Internet,” Journal of Business Ethics 28
(2000): 255. 308 Paul E. Hash and Christina M. Ibrahim, “E-mail, Electronic Monitoring, and Employee Privacy,” South
Texas Law Review 37 (1996): 896. 309 Philip Brey, “The Importance of Privacy in the Workplace,” in Privacy in the Workplace, eds., S.O. Hansson
and E. Palm (Brussel: Peter Lang, 2005), 77-82. 310 Miller, The Assault on Privacy, 25.
Workplace Surveillance and Privacy
134
databases are also considered violations of privacy when they are done without prior consent.311 Even
unauthorized access to one’s personal workspace and searches of the contents of one’s personal
computer (PC) by employers or fellow-workers can constitute a privacy invasion. Camera
surveillance that makes it possible to record and observe every movement of employees, and PC and
internet monitoring that give detailed and complete information on an employee’s activities, are the
most powerful techniques used in the organizational workplace to monitor individual conduct, and
these do often invade or violate the privacy of employees.312
Practices that endorse invasive monitoring in the workplace create an adversarial relationship
between employer and employee and between employees themselves. Computer monitoring has also
been linked with increased emotional and physical stress among employees and often leads to
unnecessary employee pressure. For all these reasons, intrusive and ongoing monitoring often leads
to under-performance, since employees rarely feel free to take responsibility for outcomes and so are
more likely to engage in corrupt practices.313 Some scholars also argue that such surveillance is really
the characteristic modern method of exerting control and power over labour. Monitoring can be
intrusive and the potential for abuse exists. For instance, computer databases, telephone and
video monitoring, active badges, and other monitoring techniques often used in the workplace, make
the private lives of workers easier to delve into without detection.314 Such monitoring and
surveillance leads employees to think of themselves as a part of a technological panopticon and
compromises their sense of freedom and of the originality of their work.
3.4.1 Privacy as a Fundamental Moral Right in the Workplace
Despite the many unresolved problems and vagueness related to the present stand of privacy in
modern society and in the workplace in particular, the concept of privacy has been extensively
analyzed by by contemporary thinkers, as we have seen. Study of this analysis will help us to deepen
its meaning. Because it is difficult to give a concrete positive definition of privacy, in terms of liberty,
autonomy, secrecy, solitude, etc., Herman prefers a negative definition in terms of “something that
cannot be ‘intruded upon,’ ‘invaded,’ ‘violated,’ ‘breached,’ ‘lost,’ ‘diminished,’ and so forth. Each
of these metaphors reflects a conception of privacy that can be found in one or more standard models
or theories of privacy”315 in relation to workplace and leads to a percepton of it as a fundamental
right. Thus, the diminishment of personal privacy is the defining panoptic effect of surveillance, as
it infringes upon the employee’s right to a private identity and consequent autonomy in any decision-
making process.
A review of some theories of privacy will better explain this. To begin with, privacy is well explained
as non-intrusion316 on one’s personal realm. According to Warren and Brandeis:
311 Brey, “The Importance of Privacy in the Workplace,” 81-87. 312 Brey, “The Importance of Privacy in the Workplace,” 88-95. 313 Miller and Weckert, “Privacy, the Workplace and the Internet,” 261. 314 This paragraph is the summary of an idea proposed by Mishra and Crampton, who present information on
the issue of employee privacy in Human Resource Management which has been fuelled by the use of various
electronic monitoring systems. See Jitendra M. Mishra and Suzanne M. Crampton. “Employee Monitoring:
Privacy in the Workplace?” S.A.M. Advanced Management Journal 63, no. 3 (1998): 4-14.
http://faculty.bus.olemiss.edu/breithel/final%20backup%20of%20bus620%20summer%202000%20from%2
0mba%20server/frankie_gulledge/employee_workplace_monitoring/employee_monitoring_privacy_in_the
_workplace.htm [ accessed March 09, 2014]. 315 Tavani, “Philosophical Theories of Privacy,” 3. 316 A variation of the non-intrusion theory, which also appeals to the notion of being let alone, is what can be
described as the ‘‘non-interference’’ theory of privacy. Whereas the non-intrusion theory focuses on being
Workplace Surveillance and Privacy
135
The intensity and complexity of life, attendant upon advancing civilization, have rendered
necessary some retreat from the world, and man, under the refining influence of culture, has
become more sensitive to publicity, so that solitude and privacy have become more essential to
the individual; but modern enterprise and invention have, through invasion upon his privacy,
subjected him to mental pain and distress, far greater than could be inflicted by mere bodily
injury.317
The right to privacy, for Warren and Brandeis, is not something to be found by squinting at the
Constitution, but by admitting that cultural values and new technologies play a large role in
developing new understandings of our rights.318 James H. Moor takes a more comprehensive
approach, stating that “an individual or group has privacy in a situation if and only if in that situation
the individual or group or information related to the individual or group is protected from intrusion,
observation, and surveillance by others.”319 Privacy is also frequently defined in terms of the control
of information in the workplace. According to Rogene Buchholz, many of the issues that involve
privacy in our society today can be stated in terms of the tension between an individual’s right to
privacy and society’s need to know.320 Charles Fried states that “[p]rivacy is not simply an absence
of information about us in the minds of others; rather it is the control we have over information about
ourselves.”321 As Werhane notes, privacy as the control of information can be understood in two
ways. First, the employee has a right to limit access to information he or she gives to an employer,
and in no case should this information be given to any outside person or organization without the
express permission of the employee. Second, employers have the right to the privacy of business
information so long as this information does not threaten public welfare.322
Alan Westin articulates this idea in the same line, stating that privacy is the claim that individuals
and groups should be allowed to determine for themselves when, how, and to what extent information
about them is communicated to others.323 Solove and Schwartz summarise, in this regard, Westin’s
four basic status of individual privacy, namely: solitude (freedom from observation), intimacy (acting
as part of small group), anonymity (acting public but seek freedom from identification and
surveillance) and reserve (psychological barrier against unwanted intrusion).324 Elizabeth Beardsley
also suggests that persons have the right to decide when and how much information about themselves
will be revealed to others.325 According to Parent, “Privacy is the condition of not having
undocumented personal knowledge about one possessed by others”326 Hence privacy is explained as
control of information about oneself. Next to this, privacy is understood in this context as liberty or
freedom to act in personal matters.327 Private situations give us zones of protection to do what we
want to do within the limits of personal freedom. We have to note here the crucial distinction between
let alone with respect to privacy invasions involving physical space (affecting one’s papers, home, and so
forth), the non-interference theory is concerned with the kind of intrusions that affect one’s ability to make
important decisions without external interference. The latter view traces its origins to an interpretation of
privacy advanced in the case of Griswold v. Connecticut in 1965. See Tavani, “Philosophical Theories of
Privacy,” 5 n. 13. 317 Warren and Brandeis, “The Right to Privacy,” 196. 318 James H. Moor, “The Ethics of Privacy Protection,” Library Trends 39 (1990): 71. 319 Moor, “The Ethics of Privacy Protection,” 76. 320 Buchholz, “Privacy,” 505-506. 321 Fried, An Anatomy of Values, 137. 322 Werhane, Persons, Rights, and Corporations, 119. 323 Fried, An Anatomy of Values,74. See also Westin, Privacy and Freedom (New York: Atheneum, 1967), 65. 324 Solove and Schwartz, Information Privacy Law, 45-48. 325 Fried, An Anatomy of Values,74. 326 Adam D. Moore, “Privacy: Its Meaning and Value,” American Philosophical Quarterly 40 (2003): 217. See
also W. A. Parent, “Privacy, Morality, and the Law,” Philosophy and Public Affairs 12 (1983): 269. 327 Fried, An Anatomy of Values, 72. Cf. Solove and Schwartz, Information Privacy Law, 45-48.
Workplace Surveillance and Privacy
136
privacy and liberty. Privacy provides an umbrella under which we are able to act freely, but there are
limits.328 We should exclude the tendency of at least some to use the right to privacy as a screen to
conceal harmful actions they may be doing. Privacy has also been described as the kernel of freedom
and the most basic right from which all other freedoms stem.329
When we think of privacy as the freedom to act, it should not be confused with liberty, though the
two are closely related. Herman Tavani invites us to “[c]onsider that privacy is essential for liberty
in that it makes possible the exercise of liberty. Whereas liberty allows individuals to hold ideas that
might be politically unpopular, it is privacy that enables them to disclose their ideas to certain
individuals while concealing from others the fact that they hold those unpopular ideas.”330 Werhane
emphasises this freedom of the employee to act even more when she states that “an employee has a
right to activities of his or her choice outside the workplace. Otherwise the employee is literally part
of the corporation and cannot have an independent life. Such dependence is tantamount to slavery.”331
Hence privacy can be explained as the freedom to act. Likewise, since this right potentially involves
values of confidentiality, trust, and intimate relationships between employer and employee and
among employees themselves, our discussion is now moving to yet another perspective on privacy,
as a moral right.
Werhane begins her discussion on privacy in the workplace from her interest in the “nature of moral
rights, the ontological character of corporations, and the status of employee rights.”332 In her view,
“corporations are created by, operate because of, and are run by persons – employees, employers,
and, to a lesser extent, stock holders. But the problem perceived was that the employees have
traditionally enjoyed only few rights at work. Even standardly recognized political rights to due
process, to freedom, and to privacy are not universally honoured.”333 Business ethicists argue here
for a variety of employee rights, such as a right to privacy, a right to be paid in accordance with
comparable worth, a right not to be the victim of discrimination, etc.334 Werhane approaches this
problem in relation to the concept of moral rights, assuming that all human beings, and in particular
rational adults, have an inherent value.335 Because of this inherent value, human beings also have
certain rights. These rights are moral rights, since everyone possesses them, but they are not
328 Fried, An Anatomy of Values, 79. 329 Buchholz, “Privacy,” 505. 330 Tavani, “Philosophical Theories of Privacy,” 5. 331 Werhane, Persons, Rights, and Corporations, 119. 332 Werhane, Persons, Rights, and Corporations, ix. 333 Werhane, Persons, Rights, and Corporations, 1. 334 Daryl Koehn, “Ethical Issues in Human Resources,” in The Blackwell Guide to Business Ethics, ed. Norman
E. Bowie (Malden, MA: Blackwell, 2002), 225. 335 Inherent value, otherwise called the ‘intrinsic value’ is an ethical and philosophic property. It is the
value that an object has "in itself" or "for its own sake", as an intrinsic property. According to Kagan, “[T]he
term “intrinsic value” does seem to wear its meaning on its sleeve — at least to the philosophically trained
— and the meaning it seems to wear is not value as an end, but rather the value that an object has solely by
virtue of its intrinsic properties.” See S. Kagan, “Rethinking Intrinsic Value,” Journal of Ethics 2 (1998):
290. Instrumental value, on the other hand, is the value of objects, both physical objects and abstract objects,
not as ends-in-thmeselves, but a means of achieving something else. It is often contrasted with items of
intrinsic value. Stanley Riukas indicates the meaning of these two kinds of values, “that the inherent values
are, roughly speaking, the desired results achieved through the operation of the instrumental values. Another,
and less etymological way of defining inherent values is that they are things, thoughts, emotions, etc. desired
for their own sakes whereas the instrumental vales are always intended for the sake of inherent values.” See
Stanley Riukas, “Inherent and Instrumental Values in Ethics,” Philosophy of Values,
http://www.bu.edu/wcp/Papers/Valu/ValuRiuk.htm [accessed November 9, 2012].
Workplace Surveillance and Privacy
137
everywhere recognized or exercised.336 We may now examine how Werhane presents her
understanding of the right to privacy in theworkplace.
First, we must distinguish between natural rights and moral rights. Herman defines natural rights as
“rights people have simply by virtue of being people.”337 In this regard, any right that exists by virtue
of natural law338 can be called a natural right. According to Philip A. Hamburger, “Natural rights are
understood in terms of freedom and natural liberty339 of an individual. It can be categorized as
consisting of life, liberty and property, or life, liberty and the pursuit of happiness. It also includes
free exercise of religion, freedom of conscience, freedom of speech, right of self defence, right to
assemble and even the right to reputation.”340 Christopher W. Morris also contends, in this respect,
that
Natural rights are those rights held prior to and independently of institutional arrangements (e.g.,
legal systems) and they derive from or have their basis in human nature or activity; they flow from
336 Werhane, Persons, Rights, and Corporations, 3. 337 Gilbert Harman, “Moral Relativism as a Foundation for natural Rights,” Journal of Libertarian Studies 3
(1979): 367. 338 Natural law is basic and fundamental to human nature. It is something that is inherent in human behaviour
and human reasoning that governs human conduct. Since it is based on human nature many Philosophers and
theologians have expressed their views on it. According to St. Thomas, the natural law is nothing else than
the rational creature’s participation in the eternal law. The eternal law is God’s wisdom, in as much as it is
the directive norm of all movement and action. For Thomas Aquinas, the law that is in us by nature is
promulgated by God implanting it in our minds as something we know by nature. See Thomas Aquinas,
Summa Theologiae, ed. Timothy McDermott (Westminster: Christian Classics, 1989), 280-289. The natural
law was invoked as a ‘higher authority’ in ancient Greek philosophy to challenge reigning political structures
and it became an argument for the possibility of the universal knowledge of good and evil. Reflecting upon
Aquinas’ idea of natural law as person’s rational participation in the eternal law, Joseph Selling would suggest
that the position of Aquinas was very close to what is today referred as ‘autonomous ethics’, although the
lack of cultural pluralism in his environment still makes it difficult to picture him within this school of
thought. See Joseph Selling, “The Human Person” in Christian Ethics: An Introduction, ed. Bernard Hoose
(London: Cassell, 1998), 62. The claim that natural law is based on nature as interpreted by human reason
shows that the reasoning or the human capacity to reason is also part of natural law. Therefore, natural law is
not something static but dynamic by our reflections on it. Natural law does not necessarily give
straightforward and dogmatic answers to every situation, rather involves a measure of interpretation and can
be applied in a flexible way. It does not simply present a fixed ‘law’ dictated by nature. See Mel Thompson,
“Natural Law,” http://www.mel-thompson.co.uk/lecture%20notes/Natural%20Law.pdf [accessed November
15, 2012]. Natural law is also said to be an ethical system of beliefs inherent in human nature which is
discovered by reason. Modern analysis of natural law differs fundamentally from that of pre-modern concern.
Here the natural law is treated independently, and it becomes more natural public law. In the modern
development, natural law is replaced by ‘the rights of man’ that emphasises a shift from man’s duties to his
rights. Whereas pre-modern natural law was on the whole ‘conservative,’ modern natural law is essentially
‘revolutionary.’ See “Natural Law,” International Encyclopaedia of the Social Sciences (1968)
http://www.encyclopedia.com/topic/natural_law.aspx#1-1G2:3045000862-full [accessed February 15,
2013]. 339 Liberty and freedom is often seen as an absence of opposition and used even interchangeable in the
literatures. I see them as a capacity to do or not do something according to the will of the individuals and
distinguish freedom as something connected to the individual and liberty as the common concern of the
society as a whole. According to Hannah Arendt liberation and freedom are not the same. She explains it in
her book ‘On Revolution’ that the liberation may be a condition of freedom, but no means leads automatically
to it. According to her, liberty can be enjoyed in private isolation and can exist even without democracy,
under a monarch or in a feudal hierarchy, though not under tyranny or despotism. The actual content of
freedom, by contrast, is participation in public affairs, or admission to the public realm. It requires a political
way of life, which means the constitution of a republic. See, Hannah Arendt, On Revolution (New York:
Viking, 1965), 22-25. 340 Philip A. Hamburger, “Natural Rights, Natural Law, and American Constitutions,” The Yale Law Journal
102 (1993): 919-920.
Workplace Surveillance and Privacy
138
some attribute(s) of the person rather than of the situation. They provide the framework within
which teleological moral considerations (if any) may operate and they include rights against
coercion.341
Based on the assumption that all human beings have value just because they are human, Werhane
writes that the moral rights derived from those qualities are uniquely characteristic of human beings.
These rights are so fundamental and inviolable that every human being possesses them despite his or
her particular social, political, historical, or even cultural situation.342 From this idea of moral rights,
she focuses on certain rights that have a concrete influence on every human life.
Article 1, 1 of the International Covenant on Civil and Political Rights, adopted by the General
Assembly of the United Nations in 1966, declares that, “All peoples have the right of self-
determination. By virtue of that right they freely determine their political status and freely pursue
their economic, social and cultural development.”343 In her discussion of moral rights, Werhane
distinguishes between political rights and economic rights: “[P]olitical rights are rights propounded
to establish a just political state. The right to life, the rights to freedom of speech, assembly,
movement and the press, the right to due process and a fair trial, the right to equal opportunity, and
the right to vote, are all political rights.”344 Rights bound up with survival, substance, labour and
ownership, she says, are classified as economic rights, though she admits the difficulty of
distinguishing between the two. Legitimate rights in the workplace also include rights to freedom
and privacy, to safe working conditions, to fair pay, to participation, and even to a meaningful job.345
Keeping these interests in mind, Werhane describes the important employer and employee political
rights, such as the rights to free expression, to due process, and to privacy in the workplace. The
distinction made by the author about political and economic rights is worthy of consideration,
because it concentrates on the right to privacy and insists on including it among the basic rights of
every individual in any working situation. Therefore, let us now consider the right to due process and
freedom that has a close relation with privacy in the workplace.
The phrase ‘due process’ is often understood to refer to any of society’s basic notions of legal
fairness: the legal requirement that the state must respect all legal rights owed to a person.346 It is a
means by which a person can appeal a decision, demand an explanation of that action, and be granted
an opportunity to argue against it.347 It balances the power of the law of the land and protects the
individual person from it. Due process generally refers to the regularity, fairness, equality and degree
of justice in both procedures and outcomes.348 According to Werhane, ‘due process’ is a means by
which one can appeal a decision to get an explanation of that action and/or a disinterested, objective,
or fair judgment of its rightness or wrongness.349 The right of corporations to due process and free
341 Christopher W. Morris, “What are the Natural Rights? A New Account,” Reason Papers 9 (1983): 62. 342 Werhane, Persons, Rights, and Corporations, 7. 343 International Covenant on Civil and Political Rights, Part 1, Article 1,1 (adopted by the General Assembly
of the United Nations on 19 December 1966 and registered ex officio on 23 March 1976), United Nations -
Treaty Series, vol. 999, I-14668, 173. http://treaties.un.org/doc/Publication/UNTS/Volume%20999/volume-
999-I-14668-English.pdf. [accessed November 25, 2012]. 344 Werhane, Persons, Rights, and Corporations, 22. 345 Werhane, Persons, Rights, and Corporations, 22. 346 “Due Process,” Encyclopaedia Britannica Online Academic Edition, Encyclopaedia Britannica.
http://www.britannica.com/EBchecked/topic/173057/due-process [accessed February 16, 2013]. 347 Patricia H. Werhane and Tara J. Radin, “Employment at Will and Due Process,” in Ethical Issues in
Business: A Philosophical Approach, eds. Thomas Donaldson and Patricia H. Werhane (New Jersey: Prentice
Hall, 1996), 365. 348Mark Stevens, “Due Process of law: Procedural and Substantive Issues,” Military Law Associates
http://faculty.ncwc.edu/mstevens/410/410lect06.htm [accessed November 25, 2012]. 349Werhane, Persons, Rights, and Corporations, 110.
Workplace Surveillance and Privacy
139
speech is recognised traditionally by courts, even where the principle of employment at will350 for
employees is upheld. Hence, Werhane states that “every employee has a right to a public hearing,
peer evaluation, outside arbitration of some other open and mutually agreed upon grievance
procedure before being demoted, unwillingly transferred, or fired.”351 There are two types of due
process: procedural and substantive.352
Procedural due process is based on the concept of fundamental fairness. It means that a person
must be notified of the charges and proceedings against him or her and have an adequate
opportunity to respond. This is done through an indictment, which is a formal document detailing
the charges. Substantive due process, on the other hand, just as procedural due process, extends
beyond the context of criminal prosecutions.353
For example, the right to privacy, although not explicitly stated in the US Bill of Rights, is a
substantive right of the people that stems from the Due Process Clause of the Fifth Amendment.354
Thus the right to due process in the workplace is justified on both legal and moral grounds.
At this point, it is worth noting the role of the freedom of the employees, who act as the driving force
in any business. Along with building a democratic workplace that is result-oriented, the freedom of
the employee is the key to keeping employees engaged and improving their productivity. In the
workplace, as Werhane expresses, “[t]he right to freedom is expressed in the rights to free expression
and to bargain collectively and strike. And these rights are challenge in two circumstances: (1) when
there is a conflict between and employee and the employer and the employee feels she needs to ‘blow
the whistle’355 on the employer, and (2) when the rights to bargain collectively and to strike are
curtailed.”356 In workplace, this includes freedom from discrimination on the basis of race, ethnicity,
350 The Industrial Revolution planted the seeds for the erosion of the employment-at-will doctrine. When
employees began forming unions, the collective bargaining agreements they subsequently negotiated with
employers frequently had provisions in them that required just cause for adverse employment actions, as well
as procedures for arbitrating employee grievances. The employment-at-will doctrine avows that, when an
employee does not have a written employment contract and the term of employment is of indefinite duration,
the employer can terminate the employee for good cause, bad cause, or no cause at all. Traditionally and as
recently as the early 1900s, courts viewed the relationship between employer and employee as being on equal
footing in terms of bargaining power. Thus, the employment-at-will doctrine reflected the belief that people
should be free to enter into employment contracts of a specified duration, but that no obligations attached to
either employer or employee if a person was hired without such a contract. Because employees were able to
resign from positions they no longer cared to occupy, employers also were permitted to discharge employees
at their whim. Cf. Charles J. Muhl, “The Employment-at-Will Doctrine: Three Major Exceptions,” Monthly
Labour Review (2001): 3. 351 Werhane, Persons, Rights, and Corporations, 110. 352 Werhane and Radin, “Employment at Will and Due Process,” 365. 353 Grand Jury, “Double Jeopardy, Self-Incrimination, Due Process,” (1791). http://public.getlegal.com/legal-
info-center/fundamental-rights/5th-amendment;
http://resources.lawinfo.com/en/articles/constitutional/federal/what-is-due-process--basic-rights-and-
fund.html [accessed December 1, 2012]. 354 The 5th Amendment states, “nor shall any person be subject for the same offense to be twice guarantees
due process from the federal government, stating no person shall “be deprived of life, liberty, or property,
without due process of law.” The states are required to provide due process because the 14th Amendment
states, “Nor shall any state deprive any person of life, liberty, or property, without due process of law.”
http://www.law.cornell.edu/wex/fifth_amendment [accessed November 25, 2012]. 355 Whistle-blowing is generally considered from the viewpoint of professional morality. Whistle-blowing is
the act, for an employee (or former employee), of disclosing what he believes to be unethical or illegal
behaviour to higher management (internal whistle-blowing) or to an external authority or the public (external
whistle-blowing). Mathieu Bouville, “Whistle-Blowing and Morality,” Journal of Business Ethics 81 (2008):
579. For example, employees are more likely to blow the whistle on bad behaviour when they feel good about
their company and believe management has a strong commitment to ethical conduct. 356 Werhane, Persons, Rights, and Corporations, 113.
Workplace Surveillance and Privacy
140
sexual orientation, age, gender, social or economic backgrounds, and freedom from sexual
harassment, unfair working conditions and freedom of conscience and speech. According to Andrew
Crane and Dirk Matten, “though the right to freedom of conscience and speech is guaranteed by
governments, within the boundaries of the firm there might occur situations where the right of speech
might face certain restrictions such as confidential matters regarding to the firm’s R&D, marketing
and accounting plans.”357 According to Werhane, the right to freedom is related to the right to
privacy. Privacy protects personal freedom and autonomy by keeping personal and intimate
information in the hands of its rightful owner. It is in fact a necessary condition for autonomy.358 She
even states that “without privacy one’s personal freedom is, at best, restricted, since the source of
free choice, one’s autonomy, is not safeguarded.”359 Hence the right to privacy is another important
basic moral right closely related to freedom. Privacy is also a relational concept. Lukas D. Introna’s
definition identifies three distinct and exclusive categories, namely: (a) privacy as a denial of access
to the person or the personal realm; (b) privacy as control over personal information; and (c) privacy
as freedom from judgement or scrutiny by others.360
Discussing these points, Introna concludes that, “privacy is a relational concept. Where people
interact, the issue of privacy emerges. It is directed towards the personal domain [...]. To claim
privacy is to claim the right to limit access or control access to my personal or private domain.”361 In
a narrow sense, privacy relates exclusively to personal information and concerns the extent to which
others have access to this information. But a broader conception of privacy extends beyond the
informational domain and encompasses anonymity and restricted physical access.362 According to
Charles Fried, “we do not feel comfortable about asserting that privacy is intrinsically valuable, an
end in itself--privacy is always for or in relation to something or someone. On the other hand, to view
it as simply instrumental, as one way of getting other goods, seems unsatisfactory too.”363 In this
regard, one of the questions raised by Buchholz in his article ‘Privacy,’ concerns “[w]hat protections
are needed to preserve that core of the individual and protect that space that is necessary for human
beings to function, and what intrusions on this space are valid to promote other people’s legitimate
interests in knowing something about that individual and what he or she is doing.”364 This in fact
presents privacy as a relational concept. Hence decisions have to be made about where the zone of
privacy ends and what information other members of the public have a legitimate right to know in
order to protect their own interests.365 The concept of privacy, even within the context of workplace,
is a topic that certainly calls for further research.
3.4.2 Privacy as the Right to Control Access to one’s Personal Affairs
The increased use of information technology in the organizational workplace, as explored in the first
chapter, raises different concerns about the privacy rights of employees. One such concern is the
right to control access to personal affairs, as explained by Philip Brey.366 This is nothing but a
357 Andrew Crane and Dirk Matten, Business Ethics: Managing Corporate Citizenship and Sustainability in
the Age of Globalization, 2nd ed. (Oxford: Oxford University Press, 2007), 293. 358 Werhane, Persons, Rights, and Corporations, 118. 359 Werhane, Persons, Rights, and Corporations, 118. 360 Lukas D. Introna, “Privacy and Computer: Why We Need Privacy in the Information Society,”
Metaphilosophy 28 (1997): 261. 361 Introna, “Privacy and Computer,” 264. 362 Buchholz, “Privacy,” 504-505. 363 Fried, An Anatomy of Values, 137. 364 Buchholz, “Privacy,” 507. 365 Buchholz, “Privacy,” 507. 366 Philip Brey, “The Importance of Workplace Privacy,” in The Ethics of Workplace Privacy, eds., Sven Ove
Hasson and Elin Palm (Brussels: P.I.E.-Peter Lang, 2005), 97-118. Personal affairs or ‘private affairs’ is
Workplace Surveillance and Privacy
141
persons’ right to protection from unwanted interference in their private affairs by a known or
unknown other and is illustrated in terms of access and control.367 In other words, privacy rights in
the workplace restrict access to private affairs. According to Brey, “there are various sorts of
intrusions into private affairs in which the violation of privacy seems to consist on the fact that these
affairs are disturbed or disrupted, rather than that information is acquired about them.”368 Privacy in
relation to access, therefore, involves both informational or cognitive access and physical access.
Cognitive access concerns information about private affairs, while physical access concerns a more
direct intrusion into people’s private affairs.369 This fact is already emphasized by Ferdinand
Schoeman, who write that that “[a] person has privacy to the extent that others have limited access
to information about him, limited access to the intimacies of his life, or limited access to his thoughts
or his body.”370 All these areas of human life feature the right to privacy, along with the right to
control and limit access to one’s personal affairs.
Along with the violation of cognitive and physical accesses, privacy issues concern the control of
one’s behaviour and living circumstances.371 Though not directly controlling a person’s thoughts and
behaviour, informed control exercises control by the acquisition of knowledge about the concerned
person and affects several aspects of that person’s life.372 Therefore, privacy intrusions in the
workplace, Brey proposes, are of different kinds: unauthorized cognitive and physical access, and
informed control.373 Brey further distinguishes five basic kinds of private affairs in relation to privacy
rights: (1) the human body; (2) personal spaces and objects; (3) bearers of personal information; (4)
individual conduct and (5) social conduct.374 In the following, we analyse these rights in relation to
workplace privacy. The concept of the human body, according to Brey, applies physically or
biologically to a specific person, and many biochemical properties are privacy-sensitive and may
even be conditioned by cultural, religious and gender factors.375 In the same way, one’s personal
space (one’s home) and the objects one owns, hires or appropriates may be privacy-sensitive.376 The
next factor, “bearers of personal information are media that contain information about aspects of a
person,” such as files, records, notes, electronic database etc., are often handled by third parties and
defined by Brey “as things connected to one’s private life or work that one considers to be private [... and]
include behaviours, information bearers, aspects of the body, private rooms, personal objects and social
events. Corresponding to these different types of private affairs are different types of intrusions on privacy.”
Brey, “The Importance of Workplace Privacy,” 100. 367 Brey, “The Importance of Workplace Privacy,” 98. 368 Brey, “The Importance of Workplace Privacy,” 98. 369 Brey, “The Importance of Workplace Privacy,” 99. See also, Yuriko Haga, “Right to be Forgotten: A new
Privacy Right in the Era of Internet,” in New Technology, Big Data and the Law, eds. Marcelo Corrales, Mark
Fenwick and Nikolaus Forgó (Singapore: Springer, 2017), 97-126; Helen Nissenbaum, “Protecting Privacy
in an Information Age: The Problem of Privacy in Public” (first published in 1998), in Privacy, ed. Eric
Barendt (Oxon: Routledge, 2017), 177-215; David M. O’Brien, “Privacy and the Right of Access: Purposes
and Paradoxes of Information Control,” Administrative Law Review 30, no. 1 (1978): 45-92; and Omer Tene
and Jules Polonetsky, “Big Data for All: Privacy and User Control in the Age of Analytics,” Northwestern
Journal of Technology and Intellectual Property 11, no. 5 (2013): 239-273. 370 Ferdinand Schoeman, ed., Philosophical Dimensions of Privacy: An Anthology (Cambridge: Cambridge
University Press, 1984), 3; Brey, “The Importance of Workplace Privacy,” 99. 371 Brey, “The Importance of Workplace Privacy,” 99. 372 Brey, “The Importance of Workplace Privacy,” 99. 373 Brey, “The Importance of Workplace Privacy,” 100. Cf. Helen Nissenbaum, “Protecting Privacy in an
Information Age: The Problem of Privacy in Public” (first published in 1998), in Privacy, ed. Eric Barendt
(Oxon: Routledge, 2017), 177-215. 374 Brey, “The Importance of Workplace Privacy,” 101. 375 Brey, “The Importance of Workplace Privacy,” 102. Nissenbaum, “Protecting Privacy in an Information
Age: The Problem of Privacy in Public,” 177-215. 376 Brey, “The Importance of Workplace Privacy,” 102.
Workplace Surveillance and Privacy
142
thus become privacy-sensitive.377 Finally, the conduct of an individual both alone and in public is
also said to be privacy-sensitive. The former, non-social behaviour, one performs when alone; the
latter, social behaviour, is one thatperforms with others.378 Based this categorization of private affairs,
Brey analyses workplace privacy and relates it to the unauthorised cognitive or physical access or
informed control. We explore this in the following.
Already in our first chapter, we have discussed medical and drug tests, body scans and other forms
of biometric authentication and electronic monitoring used in the organizational workplace. Brey
describes these practices as forms of unauthorized physical access by which workers’ bodies are
made the subject of scrutiny and assessment.379 Though generally electronic and camera surveillance
do not reveal one’s physical condition or other such information, they can violate one’s privacy. For
sometimes, it is “used in areas where employees (partially) undress or take care of their body [... or]
takes place in more (semi-) private environments, like offices, restrooms and leisure areas and has
been argued to invade privacy.”380 In the case of electronic surveillance, bodily privacy in the
workplace is most often a matter of cognitive access, while physical access is limited to medical/drug
tests and body searches. In the same way, workers do typically use a space within the workplace to
keep their personal belongings and like to have control over this space. Brey expresses the same,
stating that “workers tend to have privacy expectations concerning the access by others to personal
belongings brought to work, and often also have an expectation of privacy regarding their workspace,
e.g., the expectation that no one enters their office unannounced or goes through the contents of their
filing cabinets or computer hard drive without their consent.”381 Privacy issues here include
unauthorized access to personal space and objects through the unwanted physical presence of an
undesired other through electronic surveillance, whether by employing cameras, other devices, of
other kinds of workplace searches.
Breaches of privacy may also occur due to the number of different bearers of personal information.
As Brey explains, data about employees may be held in numerous media - employees themselves,
organizations, or agencies outside organization - and this data could be seen later by anyone else,
though initial access may be limited to a small number of people.382 Electronic databases also pose a
great threat to the privacy expectations of employees in this regard. Correspondingly, unauthorized
access to a person’s temporarily private space or private behaviour is related to the privacy of one’s
individual conduct in the workplace, which may be monitored using camera surveillance and PC and
internet devices that “theoretically [make] it possible to record and observe an employee’s each and
every movement.”383 Furthermore, the social conduct of the individual employee, which is more
work-related than personal behaviour, is also privacy-sensitive, as work-related social interactions in
the workplace may also concern a private character and involve confidentiality and trust.384 Finally,
377 Brey, “The Importance of Workplace Privacy,” 103. 378 Brey, “The Importance of Workplace Privacy,” 104. 379 Brey, “The Importance of Workplace Privacy,” 105. Brey points out some of the leading workplace privacy
issues in relation to employee’s bodies, such as: medical tests and medical background checks including
psychological assessments, drug testing, genetic testing, ‘pat down’ searches that often require partial
undressing, and X-ray body scans that can see in some cases beneath a person’s clothing and undergarments.
The technologies for these tests can be used and is used with the consent of the person or secretly. Brey, “The
Importance of Workplace Privacy,” 105-106. 380 Brey, “The Importance of Workplace Privacy,” 106. 381 Brey, “The Importance of Workplace Privacy,” 107. 382 Brey, “The Importance of Workplace Privacy,” 108. 383 Brey, “The Importance of Workplace Privacy,” 109. 384 Brey, “The Importance of Workplace Privacy,” 109-110.
Workplace Surveillance and Privacy
143
analysing workplace monitoring through the prism of fivefold private affairs, along with Brey, we
argue that privacy ought to be conceived as a right that limits access to one’s personal affairs.
3.4.3 Privacy as Prima Facie Right in the Workplace
Researchers generally agree that workplace privacy is not an absolute right but a prima facie right,
as it stands in relation to the employer’s right to acquire relevant information in the workplace and
to protect his or her property.385 No corporation or company can maintain growth without collecting
a certain amount of information about its employees. Quality control and security are also valid
concerns, as is the desire to predict human behaviour to a certain degree, for “companies believe that
the more detailed the profiles of their workers, the greater their ability to predict the probability of
their long-term success within the organization.”386 Moreover, while employee privacy concerns the
amount and kind of monitoring that takes place, it has been argued that not every instance of
accessing employee’s bodies or information is necessrily a matter of privacy.387 Anders J. Persson
and Sven Ove Hansson speak about a limited “sphere” or zone of individual privacy, and distinguish
between the private sphere and the sphere of privacy. As they write, “The private sphere is a zone in
which the individual should be allowed to make her own decisions, whereas the sphere of privacy is
a zone in which legitimate concerns may arise about others’ access to and information about her.”388
They also express concern that the boundaries of the sphere of privacy could be influenced by the
preferences of the individual employee.389
In the same vein, according to Tom McEwan, an individual’s right to privacy cannot be absolute, for
otherwise a democratic civil society would be impossible.390 The rights and interests of different
parties have to be balanced so that individual privacy is protected and balanced against the legitimate
needs of government and firms in a society that is increasingly dependent on technology.391 For
instance, there could be reasons for employers to use computer monitoring or block access to certain
websites in the workplace. It is a legitimate interest of employers to prevent employees from visiting
adult websites, spending time on social networks, blogging, tweeting and gaming during working
hours. Besides, web browsing may do damage to workplace computer systems due to viruses and
malware that could carry a high cost for the company. Some kind of regulation is therefore necessary
and generally accepted. This means that employee privacy must be protected unless a higher prima
facie right of this kind needs to be protected. Werhane also supports this view when she writes that
“strict confidentiality and employee privacy must sometimes be sacrificed for an employer’s business
freedom and to protect other employees and consumers.”392 The essence of a privacy right is not lost
in a situation where it is reasonable and justifiable to infringe on privacy to achieve a greater purpose.
For example, a majority of the population accepts that the media will publish intimate information
385 Richard A. Spinello, John Gallaugher, and Sandra Waddock, “Managing Workplace Privacy Responsibly,”
in Social, Ethical and Policy Implications of Information Technology, eds. Linda L. Brennan and Victoria E.
Johnson, 74-97 (Hershey, PA: Information Science Publishing, 2004), 88. 386 Spinello, Gallaugher, and Waddock, “Managing Workplace Privacy Responsibly,” 89. 387 Anders J. Persson and Sven Ove Hansson, “Privacy at Work: Ethical Criteria,” Journal of Business Ethics
42, no. 1 (2003): 61. 388 Persson and Hansson, “Privacy at Work: Ethical Criteria,” 61. According to Persson and Hansson the notion
of private sphere is very much central to liberal political thought after John Stuart Mill and the concept of
sphere of privacy is not identical, but analogues to it. Persson and Hansson, “Privacy at Work: Ethical
Criteria,” 61. 389 Persson and Hansson, “Privacy at Work: Ethical Criteria,” 62. 390 McEwan, Managing Values and Beliefs in Organisations, 155. 391 McEwan, Managing Values and Beliefs in Organisations, 155. 392 Werhane, Persons, Rights, and Corporations, 119.
Workplace Surveillance and Privacy
144
about criminals, terrorists, etc. and even desire this, so that dangers will be blocked and the genuine
interest of the people will be safeguarded.
Moreover, as Werhane continues, “[i]nformation on employees or prospective employees is
necessary to protect the employer against possible employee actions that would incriminate the
business and sometimes to protect honest and innocent employees against wrongful
incrimination.”393 It is also argued that although employees have a right to privacy, in order to
safeguard the welfare of the company employers have a duty to monitor employees during working
hours and claim that this right of the company outweighs the individual rights of employees.394
Relying on existing privacy norms and laws, Brey proposes in this regard “that prima facie privacy
rights apply to a thing or activity in the workplace (e.g., the use of a toilet, an e-mail message, the
contents of a purse) when such things or activities are generally considered to be private outside the
workplace.”395 He comments on the privacy rights that in ordinary circumstances relate to a person,
such as
Aspects of the human body that are not visible in everyday life; the contents of purses, shopping
bags, desk drawers and lockers; rooms that function as a working or living environment for a
person or group of persons; solitary forms of behaviour like toilet visits and solitary work breaks;
conversations about personal or leisure subjects; person-to-person postal, voice mail or e-mail
messages; and files or records with personal information.396
Therefore, according to Brey, “prima facie privacy rights apply less obviously to activities that are
strongly work-related and that involve few personal elements [...]. This is because these activities
often do not include many privacy-sensitive aspects like personal information, intimacy or
confidentiality.”397 However, he agrees with Helen Nissenbaum, who has argued for justifiable
privacy expectations even in a public context, though in public places privacy expectations are
alarmingly diminished.398 Applying Nissenbaum’s acount of privacy in public areas to the workplace,
Brey argues that,
[s]olitary working activity and work-related interactions and conversations are not usually
privacy-sensitive to the extent that accidental or intentional intrusions on them by third parties
necessarily constitute serious violations of privacy, but sustained intense surveillance of such
activities, possibly even done in secret and possibly performed without accountability for the use
of the information thus collected, appears to run contrary to normal information-governing norms
and normal expectations of contextual integrity, and can therefore be identified as prima facie
violations of privacy.399
Such a violation of privacy, in his opinion, causes “diminished worker autonomy, the erosion of trust
between employee and employer, lower morale, and stress and health problems.”400 However, the
extent to which personal privacy can be compromised is a matter of continued debate, and employers
need to take into account employees’ basic human rights and privacy issues. Employers should be
393 Werhane, Persons, Rights, and Corporations, 120. 394 Lee and Kleiner, “Electronic Surveillance in the Workplace,” 73. 395 Brey, “The Importance of Workplace Privacy,” 111. 396 Brey, “The Importance of Workplace Privacy,” 111. 397 Brey, “The Importance of Workplace Privacy,” 111. 398 Brey, “The Importance of Workplace Privacy,” 111-112. See also, Helen Nissenbaum, “Protecting Privacy
in an Information Age: The Problem of Privacy in Public,” Law and Philosophy 17 (1998): 559-596. 399 Brey, “The Importance of Workplace Privacy,” 112. 400 Brey, “The Importance of Workplace Privacy,” 112-113.
Workplace Surveillance and Privacy
145
held accountable in each case to justify their reasons for monitoring and demonstrate that it is
motivated by a legitimate business interest and not mere curiosity or private interest.
Two arguments are often made to limit workplace privacy, as discussed in the previous chapters:
ensuring good performance by employees and preventing harm to the organization. Brey poses a
question: if limiting privacy is not necessary to ensure work performance, how can such limitation
on privacy be justified? If good performance is the result of the quality and quantity of work output
by each employee completing the responsibilities proper to his or her role without harming the
organization, then none of these employer’s interests require strong workplace surveillance.401
Therefore, close surveillance is not necessary to ensure such output, and the normal interaction
between employees and management should increase the fulfilment of role responsibilities. In the
same way, Brey also states that:
[W]hen there are clear indications that an employee is engaging in fraud or theft [...] invasions of
the employee’s privacy, including searches and e-mail and telephone monitoring, may be justified.
At issue, however, is whether the prevention of harm to the organization justifies routine searches,
routine e-mail and telephone monitoring, extensive camera surveillance, and so on. This would,
indeed, be hard to justify as it would run counter to the way security is balanced against privacy
and civil liberties in other sectors of society.402
Thus, Brey even denies that probable cause theory is applicable in this context, and thus is not a
justification for strong workplace surveillance. Researchers also opine that “since workers have to
spend much time in the workplace and their private lives cannot be separated completely, employers
should approve employees’ privacy rights partially during the working hours, [... and] to keep a good
relationship with employees, management has to balance employees’ privacy against the company’s
total benefit.”403 For though very often the employer sets and defines a reasonable expectation of
privacy, establishing further policies and procedures, “given the large number of legitimate business
interests that can be advanced through the use of electronic monitoring devices, it is often difficult
for an employee to establish a reasonable expectation of privacy.”404 Employees often feel that
electronic monitoring is unlawful conduct interfering with their private affairs, and therefore insist
that all such forms of monitoring be abolished.405 Therefore, there is a delicate balance indeed
between employers’ need to collect information and employees’ experience of intrusiveness. To
achieve and maintain this balance requires an acceptable management model, which we will explore
in the last part of this research.
3.5 CONCLUSION
This chapter has explored of the concept of privacy, including many facts about privacy, its various
conceptualizations, critiques, supporting arguments, and its relationship with electronic surveillance
in the organizational workplace. Concern for the protection of privacy, particularly in a workplace
context, is a crucial element in national and international movements for human rights and freedoms.
With regard to the workplace, we have discussed several privacy interests of individuals that are of
primary concern as fundamental rights, including the right to individual autonomy, the right to be let
alone, the right to a private life, the right to control information about oneself, the right to limit
accessibility, the right to minimize intrusiveness, the right to expect confidentiality, and others.
401 Brey, “The Importance of Workplace Privacy,” 114. 402 Brey, “The Importance of Workplace Privacy,” 115. 403 Lee and Kleiner, “Electronic Surveillance in the Workplace,” 76. 404 Kevin J. Conlon, “Privacy in the Workplace,” Chicago-Kent Law Review 72, no. 1 (1996): 290. 405 Lee and Kleiner, “Electronic Surveillance in the Workplace,” 75.
Workplace Surveillance and Privacy
146
Conversely, privacy is also a moral right, and as such there is a presumption against its
contravention.406 New technological developments have led to a diminution of privacy in the
workplace especially because of electronic surveillance. As a majority of scholars agree, workplace
surveillance invades workers’ privacy, erodes their sense of dignity and frustrates their efforts to do
high-quality work by promoting a single-minded emphasis on speed and purely quantitative
measurements.407 Extreme positions regarding electronic surveillance in the workplace, based on a
view that employees ought to be monitored each and every minute of the working day or even outside
of the workplace, often are willing to allow unjustified infringements of privacy. Though job
relevance and informed consent can justify some monitoring in the workplace, most employees do
not want their every sneeze registered and monitored, even for legitimate business reasons. The need
for privacy, as Solove would put it, is arises from the fact that we have social relationships and
concomitant norms of dignity and decorum.408 Thus, despite the technological and technical
possibilities of infringing on privacy, particularly in the case of electronic monitoring in the
workplace, the protection of privacy ought to be given a higher priority.
The protection of personal privacy and thus of the individuality of each employee will foreseeably
remain a significant workplace issue in this increasingly automated era of information technology.
For workplace surveillance, carried out for different purportedly benevolent purposes, has several
detrimental consequences and has the potential to hinder employee liberty and erode one’s
individuality and right to be oneself. In India, as economic activity has changed from manufacturing
to service, as analysed in the second chapter, the workplace is now very often an electronic office,
and thus the method of monitoring and controlling workers have dramatically changed. Visual
observation has given way to electronic monitoring devices and brought a kind of Big Brother into
the office in an obvious way. Thus “the use of bugging devices, employee monitoring computers and
video cameras has turned jobsites into detention centres where the rights of privacy are surrendered
at the door.”409 In brief, workplace privacy rights are a prerequisite for the safeguarding and
preservation of the individuality and dignity of employees in the workplace. The above discussed
employee privacy violations, due to the use of electronic surveillance devices in the workplace, can
also in many cases be linked directly or indirectly to justice violations. This fact leads our discussion
beyond of the concerns of an individual rights perspective to a more inclusive rights perspective,
encompassing issues related to employee sorting and discrimination. Besides, privacy advocates and
regulators today commonly address social problems that are far wider than individual privacy
invasions and raise broader questions about discrimination, social control and the dangers of the
creeping surveillance society. We analyse these questions in the following chapter.
406 Miller and Weckert, “Privacy, the Workplace and the Internet,” 263. 407 J. Lund, “Electronic Performance Monitoring: A Review of the Research Issues,” Applied Economics 23,
no. 1 (1992): 54. 408 Solove, Understanding Privacy, 148. 409 Conlon, “Privacy in the Workplace,” 296.
CHAPTER FOUR
POWER DISTANCE AND ‘SOCIAL SORTING’: EFFECTS OF SURVEILLANCE
BEYOND PRIVACY
4.0 INTRODUCTION
Do the privacy concerns of individual employees give us a complete picture of the significance of
contemporary electronic surveillance in the organizational workplace? The answer is no. The
implementation of extensive employee monitoring is unwaveringly linked to justice (social)
violations - discriminatory and control practices - that have several detrimental outcomes.1 David
Lyon, for instance, argues that the issue of surveillance impact goes beyond privacy invasions and
wonders “where the human self is located if fragments of personal data constantly circulate within
computer systems beyond any agent’s personal control.”2 For him, privacy interpretations of
surveillance “tend not to see surveillance as a social question or one that has to do with power.”3
Besides, he thinks, it expresses an intense contradiction: “privacy answers, consistently but
paradoxically, to personal fears of invasion, violation and disturbance [and] having successfully
prised each of us from our neighbours so that we could be individuated social actors, amenable to
classification and sorting and disembodied abstractions, privacy responses echo just such
individuation.”4 This chapter, therefore, within the scope of our study, applies this urge to go beyond
privacy to consider its social effects in a particular organizational workplace context, in dialogue
with David Lyon’s concept of social sorting.
The chapter is organized into five sections. Each critically and ethically discusses the social aspects
and effects of workplace surveillance. We begin with a descriptive analysis of the concept ‘social
sorting’ and thus the non-identified impacts of everyday surveillance on the individual. The second
section methodically and dialogically delves into the more concrete situation of workplace
surveillance and its sorting impacts, and further describes how a variety of social identities are being
constructed and reinforced. In the third section, power culture, a progeny of the technological
surveillance, will be analyzed as an instrument of managerial coercion and employee subordination
or subjectification. The fourth section, analysing the disconcerted stress, increased distrust, and the
ensuing deviances and resistance, focuses on the forgotten behavioural effects of employee sorting
and control. Along with and apart from these issues, what makes the Indian situation distinct is the
subject of the fifth section. While concerns about personal privacy invasion are a very important
aspect of workplace surveillance, this chapter aims to show that its social aspects are no less
significant.
1 Kaupins and Coco, “Perceptions of Internet-of-Things Surveillance by Human Resource Managers,” 54. 2 David Lyon, The Electronic Eye: The Rise of Surveillance Society (Minneapolis: University of Minnesota
Press, 1994), 18. Critiquing the critics of privacy advocates, who say that the concept of privacy is rooted in
liberal individuation, trying to protect the self and reinforcing individuation risking sociability, Colin J.
Bennett quotes David Lyon and argues that “the individualistic conceptions of privacy, however, hardly
constitute a paradigmatic understanding of the problem, and there have been a number of attempts to realign
the issue in ways that perhaps hold more contemporary relevance.” Colin J. Bennett, “In Defence of Privacy:
The Concept and the Regime,” Surveillance & Society 8, no. 4 (2011): 487. 3 David Lyon, Surveillance Society: Monitoring Everyday Life (Buckingham: Open University Press, 2001),
150. 4 Lyon, Surveillance Society: Monitoring Everyday Life, 150.
Power Distance and Social Sorting
148
4.1 SOCIAL SORTING: A NEW MECHANISM BEYOND PRIVACY
In their analyses researchers have identified some new trends in surveillance: that it (1) “entails a
process of blurring boundaries,” (2) “has become simultaneously more visible and invisible,” (3) and
“involves the democratization.”5 That means that surveillance operates at different levels, sometimes
visible with a clear use of cameras and other times with a curious invisibility, using embedded
sensors. In this context, “new asymmetries have emerged, such that the surveillance of more powerful
groups is often used to further their privileged access to resources, while for more marginalized
groups surveillance can reinforce and exacerbate existing inequalities.”6 This discriminative
character, which will be analysed in detail in the following sections, is now subject to serious and
deep discussion as it relates to all life chances. Similarly, since new surveillance processes are largely
associated with electronic technologies, an adequate understanding of this practice requires, along
with an appreciation of privacy concerns, also newer concepts like social sorting and surveillance
assemblage.7 This prepares us to recognize new dimensions of its social and other particular
practices. The concept of “surveillance assemblage” is used to describe “the complex assortment of
machines and procedures for extracting, sorting and delivering information today.”8 Nevertheless,
within the scope of this study, we will focus on the concept of “social sorting” to explore the
detrimental effects of surveillance in the organizational workplace.
In a general sense, ‘sorting’ refers to arranging things of the same class or nature in a certain
sequence, categorizing them according to a grouping, or labeling things with similar properties or
characteristics. Social sorting, along these same lines, refers to the categorization or separation of
persons or groups into various segments based on various ethno-geographic, economic, occupational
and other details of social status. In fact, social sorting is of an ancient practice,9 as the differentiation
of society into distinct categories or strands is necessary for the sustenance and progression of social
life. Due to the modern desire to augment all practices using technology, it has also been central to
contemporary societies.10 It is facilitated today by networked computer database and is intended to
reduce risk and anticipate certain objectionable behaviours by using simulations. As Lyon rightly
states, this successive “categorization is not a neutral process because it constitutes an intervention
in the social world of those classified.”11 Lyon’s research on the concept of surveillance explores it
as a mechanism of social sorting12 and reminds us that while the significance of individual rights and
interests are not to be minimized, broader concerns of ethics and social justice must be envisaged in
its discussion and understanding. It is observed that for some, the ICT-mingled post-modern world
5 David Lyon, Kevin D. Haggerty and Kirstie Ball, “Introducing Surveillance Studies,” in Routledge Handbook
of Surveillance Studies, eds. Kirstie Ball, Kevin D. Haggerty and David Lyon, 1-11 (Oxon: Routledge, 2014),
2-3. 6 Lyon, Haggerty and Ball, “Introducing Surveillance Studies,” 3. 7 Lyon, Haggerty and Ball, “Introducing Surveillance Studies,” 5. While social sorting highlights its
categorizing tendencies (amplifying social divisions) initiated by various statistical and software practices
enabled due to the implementation of current technological advancements, the surveillant assemblage looks
for “how discrete and varied surveillance systems tend to converge into flows of personal data, drawing
members of any and all populations into their purview.” Lyon, Haggerty and Ball, “Introducing Surveillance
Studies,” 5-6. 8 William Bogard, “Simulation and Post-Panopticism,” in Routledge Handbook of Surveillance Studies, eds.
Kirstie Ball, Kevin D. Haggerty and David Lyon, 30-37 (Oxon: Routledge, 2014), 30. 9 David Lyon, “Facing the Future: Seeking Ethics for Everyday Surveillance,” Ethics and Information
Technology 3 (2001):172. 10 Lyon, “Facing the Future: Seeking Ethics for Everyday Surveillance,” 172. 11 Lyon, “Facing the Future: Seeking Ethics for Everyday Surveillance,” 173. 12 Lyon, Surveillance Society: Monitoring Everyday Life, 51-66; David Lyon, “Surveillance as Social Sorting:
Computer Codes and Mobile Bodies,” in Surveillance as Social Sorting: Privacy, Risk, and Digital
Discrimination, ed. David Lyon (London: Routledge, 2003), 13-30.
Power Distance and Social Sorting
149
makes surveillance-metaphors such as Big Brother or panopticon less relevant as technologies
increasingly creep into everyday life of individuals.
Though Lyon acknowledges the appropriateness and benefits of the kinds of surveillance
technocratic societies13 have come to take for granted, his primary concern is “the apparently
innocent embeddedness of surveillance in everyday life [that] does raise some important questions
for sociological analysis.”14 As he observes, this social sorting aims to “a world well beyond
nightmare fears of the Big Brother state [and…] is one in which surveillance is diffused throughout
society, whether at work or play, in worship or performance, whether web-surfing or purchasing.”15
For this concept of ‘social sorting’ highlights that contemporary surveillance sieves and sorts people
for assessment and judgement. People are sorted into multiple categories, “assigning worth or risk,
in ways that have real effects on their life-chances.”16 Roy Coleman later adds that, “[i]n its many
guises, surveillance aims to place people into categories underpinned by notions of ‘worth’ or ‘risk’.
Surveillance therefore has a relational link to assigning social status, with the consequences of
promoting the life chances of some while curtailing those of others.”17 According to Lyon
“categorization is endemic and vital to human life, especially to social life [… and] received a major
boost from modernity.”18 In his view, modernity has, in fact, given populations their institutional
and/or organizational identities, and this has strongly determines their life-chances.
Likewise, Lyon observes, “[w]hile discourses of privacy have become crucial to legislative and
political efforts to deal with what is perceived to be the darker face of surveillance they frequently
fail to reveal the extent to which surveillance is a site of larger social contests. [...] Surveillance
practices and technologies are becoming a key means of marking and reinforcing social divisions
[...].”19 Surveillance is here viewed as a matter of social justice, not only of personal privacy.
Referring to Oscar Gandy’s work on the “panoptic sort,” Lyon illustrates how database marketing
companies can use wide-scale consumer surveillance to cream off certain groups and cut off others,
resulting in discriminatory practices.20 Lyon argues that this type of discriminative practices in the
consumer realm can be experienced in other areas of human life as well. The concept of surveillance
as social sorting focuses “on the social and economic categories and the computer codes by which
personal data is organized with a view to influencing and managing people and populations.”21 The
stored data similarly creates a different profile of people and channels the life-choices and life-
chances of their everyday lives. This can lead to social stratification. Though certain kinds of personal
and social categorization are an everyday part of human life, the automation of this process can
13 The concept ‘technocratic society’ is used here to refer any society governed using more technical expertise,
where the technical superiority facilitates the influence of one this society over the other. 14 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 18. 15 David Lyon, “Introduction: Surveillance as Sorting,” in Routledge Handbook of Surveillance Studies, eds.
Kirstie Ball, Kevin D. Haggerty and David Lyon (London: Routledge, 2014), 119. 16 David Lyon, “Introduction,” in Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination,
ed., David Lyon (London: Routledge, 2003), 1. 17 Roy Coleman, “Surveillance and Social Ordering,” in Criminal Justice: Local and Global, eds. Deborah
Drake, John Muncie and Louse Westmarland (Cullompton: Willan, 2010), 150. 18 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 21. 19 Lyon, Surveillance Society: Monitoring Everyday Life, 143. 20 Lyon, “Introduction,” 1. The panoptic sort is said to be a complex discriminatory technology, that, according
to Oscar H. Gandy Jr., “[i]t is panoptic in that it considers all information about individual status and
behaviour to be potentially useful in the production of intelligence about a person’s economic value [and] it
is a discriminatory technology because it is used to sort people into categories based upon these estimates.”
Oscar H. Gandy Jr., “Coming to Terms with the Panoptic Sort,” in Computers Surveillance, and Privacy, eds.
David Lyon and Elia Zureik, pp. 132-155 (Minneapolis: University of Minnesota Press, 1996), 133. Cf.
Kaupins and Coco, “Perceptions of Internet-of-Things Surveillance by Human Resource Managers,” 54. 21 Lyon, “Introduction,” 2.
Power Distance and Social Sorting
150
become detrimental.22 Here the use of technology itself becomes an engine of exclusion and
increased inequality, as we explore in the following segments.
4.1.1 Regrettable Reductionism: Human Beings as “Coded” Data Subjects
Social sorting is viewed also as a mechanism of structuring a society to enable identification and as
means of maintaining order. Today, the question of “who you are” is basic to surveillance and is
answered in multiple ways due to the advancement of sophisticated digitalized technology: with
“passports, identity cards and social security numbers,” etc.23 Lyon, in line with Richard Jenkins,
writes that “surveillance, that is a means to an end, one-sided, increasingly impersonal, intrusive and
yet distant, routine and banal, is what today frames identification. Thus, categorization may be on its
way to achieving dominance in identification.”24 New electronic infrastructures and subsequent
sophisticated datamining techniques raise the issue of identification and social sorting by “increasing
concern with recording, retrieving, and analysing personal data to manage risks effectively” and “do
so by sorting population and individuals into categories of risk so that they can be treated
accordingly.”25 The risk formulated here is that the lives of ordinary people are sorted for better or
for worse as their data are scrutinized and they, human beings, are no longer “bodies” but rather mere
“matter” to be displayed.
The rapid advancement in ICTs makes it possible to do things at a distance. Modern surveillance, in
this regard, has raised the issue of “disappearing bodies”26 in societal human interactions and thus
reconfigures the way social relationships are generated and fostered.27 The idea of disappearing
bodies shows “how surveillance systems have arisen in an attempt to compensate for the
disembodiment of many social relationships. And it reminds us that contemporary surveillance
practices tend overwhelmingly to base themselves on abstractions rather than on embodied
persons.”28 Human persons thus become data subjects as social power of information is reinforced
in the modern context and this data is on the move now. Lyon observes that “[d]ata doubles – various
concatenation of personal data that, like it or not, represent “you” within the bureaucracy of the
network – now start to flow as electrical impulses, and are vulnerable to alteration, addition, merging,
and loss as they travel.”29 Any assessment or judgement about a person is made based on coded
criteria through surveillance practices. It might place one person in an affluential category and
another as a victim of Big City Stress or a part of the impoverished or impecunious class. One might
have health risks and hazards, while another has good prospects and profiles.30 Lyon rightly adds,
quoting Geoffrey C. Bowker and Susan Leigh Star, that “values, opinions, and rhetoric are frozen
22 David Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” in Surveillance as Social
Sorting: Privacy, Risk, and Digital Discrimination, ed., David Lyon (London: Routledge, 2003), 13. 23 Lyon, “Introduction: Surveillance as Sorting,” 120. 24 Lyon, “Introduction: Surveillance as Sorting,” 120. 25 David Lyon, “Surveillance, Security and Social Sorting: Emerging Research Priorities,” International
Criminal Justice Review 17, no. 3 (2007): 163. 26 The presence of the other was a meeting point, at one point of time, to conduct all human daily affairs in the
society. There fostered the face to face interaction and thus the decision-making process and identity
authentication. Beside face to face interaction, today, practices of relying “on tokens of trust (e.g., PIN
numbers and passwords) and electronically mediated networks to accomplish daily tasks that do not involve
other human being at the point of contact” are common. Sean P. Hier and Josh Greenberg, “Surveillance, the
Nation-State and Social Control,” in The Surveillance Studies Reader, eds. Sean P. Hier and Josh Greenberg,
11-17 (Berkshire, England: McGraw-Hill, 2007), 11. 27 Lyon, Surveillance Society: Monitoring Everyday Life, 15-27. 28 Lyon, Surveillance Society: Monitoring Everyday Life, 26. 29 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 22. 30 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 23.
Power Distance and Social Sorting
151
into codes.”31 This shows the intensity and gravity of surveillance that reduces the human person to
a collection of coded data. This phenomenon can be called a regrettable.
A person is thus reduced to a series of various codes, and these coded bodies provide information
without any physical nearness. In this way often one is included into or excluded from various public
platforms. What happens here we can call reductionism, and specifically an ontological reductionism
by means of representation, whereby the physical and the natural are symbolized, represented or
embodied through the media of abstract data and codes. According to Lyon, unlike modern
surveillance that distinguishes one identifiable individual subject from others and thus furthers the
process of individuation, postmodern surveillance looks for a multiplication of identities by a process
of splitting and reconnecting with current data analysis.32 Here, electronic technologies being the
key, “[v]irtual replace actual processes and electronic signs and images of objects and events replace
their real counterparts.”33 Hence, the actual and the real are represented by something else that could
well be misread or manipulated due to the lack of immediate presence. Referring to the idea of
simulation as a “reproduction of the real by means of codes and models,” Lyon writes that,
“[s]imulation tries to achieve a reality effect while simultaneously concealing the absence of the real.
The real becomes redundant as a referential ground for the image – hence, hyper-reality. The
hyperreal, then, is the code (the ‘technologies of signalization’) that precedes that ‘real’ and brings
it into being. […] This is how the code comes to prominence as the mode of domination and
control.”34 Now there is no real, there is only representation, and thus we see an ‘end of the social.’
This claim calls for verification and further analysis.
Another danger arising from seeing persons as mere bodies with information to be tracked or
displayed is that “when information about the body in part constitutes what we understand as the
body, telling the difference between the one and the other becomes increasingly hard.”35 In the same
way, reflecting on contemporary practices of surveillance with a critical and humanistic
understanding reveals that our highly mobile bodies are, today, “traced and tracked unceasingly by
computer codes with which simultaneously we interact both to display our data and to determine
directions we take in response to the process.”36 Lyon demonstrates that, “codes usually processed
by computers, sort out transactions, interactions, visits, calls, and other activities; they are the
invisible doors that permit access to or exclude from participation in a multitude of events,
experiences, and processes.”37 These types of classification also influence and manage the life
chances of people. Lyon goes on to illustrate, in this regard, that “[i]n all its ambiguity and
31 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 23. Cf. Geoffrey C. Bowker
and Susan Leigh Star, Sorting Things Out: Classification and its Consequences (Cambridge, MA: MIT Press,
1999), 135. 32 Lyon, Surveillance Society: Monitoring Everyday Life, 115-116. 33 Lyon, Surveillance Society: Monitoring Everyday Life, 116. 34 Lyon, Surveillance Society: Monitoring Everyday Life, 116. See, Jean Baudrillard, Simulations (New York:
Semiotext(e), 1983), 82-84. William Bogard explains the simulation of surveillance as “a control strategy that
informs most of the latest diagnostic and actuarial technologies we associate with the information age –
computer profiling and matching, expert decision-systems and cybernetic intelligence, electronic polling,
genetic mapping and recombinant procedure, coding practices of all sort, virtual reality.” William Bogard,
“Surveillance, Its Simulation, and Hypercontrol in Virtual Systems,” in The Surveillance Studies Reader, eds.
Sean P. Hier and Josh Greenberg, pp. 95-103 (Berkshire, England: McGraw-Hill, 2007), 96. This
surveillance, as Bogard continues, is simulated by preceding and redoubling the means of observation through
available advanced technologies. For instance, computer profiling is a surveillance before an actual
surveillance – a technology of “observation before the fact” as a kind of prior ordering for an actual act.
Bogard, “Surveillance, Its Simulation, and Hypercontrol in Virtual Systems,” 96. 35 Lyon, “Introduction: Surveillance as Sorting,” 121. 36 Lyon, “Introduction: Surveillance as Sorting,” 119. 37 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 13.
Power Distance and Social Sorting
152
complexity, surveillance is rationalized and automated through searchable databases and statistical
techniques and the resulting classifications directly and indirectly affect people’s choices and life-
chances.”38 This searchable database and its adverse effects are discussed in the following.
4.1.2 Searchable Databases and Digital Redlining
A database is an organized or structured collection of information or related data stored in a common
file or collection of files, often created by commercial vendors.39 It is “an integrated collection of
data, usually so large that it has to be stored on secondary storage devices such as disks or tapes.”40
One of the key trends of today’s surveillance, according to Lyon, is the use of searchable databases
to process personal data for many purposes. Similarly, Elia Zureik quotes Robert Castle, who says
that “surveillance is practiced without any contact or any immediate representation of the subjects
under scrutiny.”41 From this, Zureik concludes that, “as a matter of fact, the subject that is exposed
to the ‘observable gaze’ dissolve and is reconstituted in the abstract through categorization.”42 For
instance, access to “richer sources of information about individuals and populations is believed to be
the best way to check and monitor behaviour, to influence persons and populations, and to anticipate
and pre-empt risks.”43 Explaining this further, Lyon illustrates an example from current marketing
practices, namely that marketers often sift and sort populations according to their spending patterns
– how they act as consumers - then treat different clusters accordingly.
For Lyon, “groups likely to be valuable to marketers get special attention, special deals, and efficient
after-sales service, while others, not among the creamed-off categories, must make do with less
information and inferior service.”44 This process of classifying customers according to their relative
38 Lyon, “Introduction: Surveillance as Sorting,” 119. 39 As a structured collection of records, databases add, remove, update records and can retrieve data that match
certain criteria and can use manipulative or progressive manner. Bhavesh Pandya, Safa Hamdare and Asim
Kumar Sen, Database Management System (Noida, New Delhi: Vikas, 2015), 2. For a fuller understanding,
it is right to quote that “databases play a critical role in almost all areas where computers are used, including
business, electronic commerce, engineering, medicine, genetics, law, education, and library science. [...] A
database represents some aspect of the real world, sometimes called the miniworld or the universe of discourse
(UoD). Changes to the miniworld are reflected in the database. A database is a logically coherent collection
of data with some inherent meaning [... and] is designed, built, and populated with data for a specific purpose.
It has an intended group of users and some preconceived applications in which these users are interested.”
Ramez Elmasri and Shamkant B. Navathe, Fundamentals of Database Systems, 6th ed. (Boston: Addison-
Wesley, 2011), 4. 40 Raghu Ramakrishnan and Johannes Gehrke, Database Management Systems Solutions Manual, 3rd ed. (New
York: McGraw-Hill, 2003), 1. See also, Thomas Connolly and Carolyn Begg, Database Systems: A Practical
Approach to Design, Implementation, and Management, 4th ed. (Harlow: Addison Wesley, 2005), 15. 41 Robert Castle, “From Dangerousness to Risk,” in The Foucault Effect: Studies in Governmentality with two
Lectures by and Interview with Michel Foucault, eds. G. Burchell, C. Gordon and P. Miller (Chicago:
University of Chicago Press, 1991), 288. 42 Elia Zureik, “Theorizing Surveillance: The Case of the Workplace,” in Surveillance as Social Sorting:
Privacy, Risk, and Digital Discrimination, ed., David Lyon (London: Routledge, 2003), 39. 43 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 14. 44 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 14.
Power Distance and Social Sorting
153
worth is known as “digital redlining”45 or “weblining”46 and continues as long as acting through these
indicators of worth remains profitable.47 In general, “redlining is a spatially discriminatory practice
among retailers, of not serving certain areas, based on their ethnic-minority composition, rather than
economic criteria, such as the potential profitability of operating in those areas.”48 The term “digital
redlining” is derived from this practice of redlining or in other words drawing a “red line” around
disadvantaged populations, refusing or restricting their access to different modes of life chances. A
morphed version of redlining in the digital age can be called weblining or internet redlining, and is
more related to retail redlining, which takes place not in physical space but in cyberspace.49
In the same way, “redlining refers to physical spaces and neighbourhoods but discrimination can
occur in virtual spaces like Web sites where people are profiled and sorted into groups that are
categorized for differential pricing and services.”50 Weblining is moreover a process or practice of
denying or restricting certain opportunities to people due to various observations about their digital
selves.51 It thus involves an obvious process of grading actual or virtual customers and projects by
means of an illegitimate dissemination of personal information and subsequent engagement in
redlining, which unfairly discriminates against certain persons or groups. For instance, “[w]eblining
refers to the exclusion of classes of consumers from the marketplace based on characteristics of
groups not individuals […]. People are not treated as individuals and therefore unjust and unfair
practices may prevail.”52 The risk of database discrimination is, thus, “the possibility of better – or
worse – targeting of those customers who might be profitable and either the neglect or the hyper-
exploitation of the less profitable.”53 Digital redlining or digital weblining, therefore, is an alleged,
purposively discriminative, practice that occurs side-by-side with monitoring populations in any
form by means of digital and electronic media. It purportedly occurs when organizations and
institutions bypass poor populations or neighbourhoods due to the data collected through employing
various monitoring systems. The problem is also due to the lack of concern and interest shown to the
representation of minorities.
4.1.3 The Regime of Regulating Mobilities and Virtual Existence
As we live today in an increasingly mobile world with much increased physical and virtual mobility,
surveillance practices have also evolved in a parallel way and been implemented by various means
45 Redlining is generally perceived as an unethical practice where financial institutions and organizations are
extremely reserved and make it difficult or in some cases impossible for residents of poor inner-city
populations and neighbourhoods to carry certain financial transactions such as borrowing money or gain
access to other financial services because of a history of high default rates. Here the rejection or reservation
does not take the individual's qualifications and creditworthiness into account. Denver D’Rozario and Jerome
D. Williams, “Retail Redlining: Definition, Theory, Typology, and Measurement,” Journal of
Macromarketing 25, no. 2 (2005): 175. People in these areas become economically and socially more
vulnerable. 46 Weblining is generally viewed as “the tracking of information as people work their way through the web.”
Jennifer Ellis, “Internet Privacy: What is Weblining and Does it Really Exist?” Quara, November 6, 2013.
https://www.quora.com/Internet-Privacy-What-is-weblining-and-does-it-really-exist [accessed January 10,
2017]. Weblining is an abusive online conduct that have emerged due to the proliferation of the internet in
our lives. Andra Gumbus and Patricia Meglich, “Abusive Online Conduct: Discrimination and Harassment
in Cyberspace,” Journal of Management Policy and Practice 14, no. 5 (2013): 47-49. 47 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 14. 48 D’Rozario and Williams, “Retail Redlining: Definition, Theory, Typology, and Measurement,” 175. 49 D’Rozario and Williams, “Retail Redlining: Definition, Theory, Typology, and Measurement,” 186. 50 Gumbus and Meglich, “Abusive Online Conduct: Discrimination and Harassment in Cyberspace,” 48 51 Gumbus and Meglich, “Abusive Online Conduct: Discrimination and Harassment in Cyberspace,” 48. 52 Gumbus and Meglich, “Abusive Online Conduct: Discrimination and Harassment in Cyberspace,” 48-49. 53 Perri 6 and Ben Jupp, Divided by Information? The 'Digital Divide' that Really Matters and the Implications
of the New Meritocracy (London: Demos, 2001), 47.
Power Distance and Social Sorting
154
and techniques in everyday life. It is observed that “in a rapidly moving mobile world, our modes of
social integration are increasingly abstract and surveillance practices try to keep up with our
movements. They locate us, target us, and attempt to coordinate our activities.”54 Moreover, as Lyon
continues, “nomadic bodies and digital personae are the subjects of contemporary computer-based
surveillance, and are categories altogether more slippery and malleable than those utilized in previous
surveillance regimes.”55 Lyon mentions how the use of CCTV in Europe and Asia to control crime
and maintain social order is applicable in different situations. According to him,
[i]n most cases, searchable databases are not yet used in conjunction with CCTV, though the aim
of creating categories of suspicion within which to situate unusual or deviant behaviours is firmly
present. In some cases, however, searchable databases are already in use in public and private
situations, to try to connect facial images of persons in the sight of the cameras with others that
have been digitally stored.56
Today, apart from fixed the CCTV operations of varied sites of interest, moving targets have also
been subjected to monitoring due to technological advancements such as the use of the Global
Positioning System (GPS) and Geographic Information Systems (GIS), which has been already
discussed in the first chapter. Also, today, wireless telephony is a powerful means of mobile
surveillance. Spatio-temporal barriers disappear and become less problematic as concerns of distance
and time vanish and mobilities are regulated. Here we can see a new virtual existence, beyond the
presence of embodied persons. It is no longer the case that a person’s image and his or her embodied
relationships are co-present with each other.57 These digital personae occupy no space and pertain
only to virtual space or virtual existence. Lyon, in this regard, rightly points out that,
Abstract data and images stand in for the live population of many exchanges and communications
today. Some of those abstract data and images are deliberately intercepted or captured in order to
keep track of the now invisible persons who are nonetheless in an immense web of connections.
Thus, the disappearing body is made to reappear for management and administrative purposes by
more or less the same technologies that helped it to vanish in the first place.58
Technologies that enable mobility simultaneously enable surveillance, and in turn this regulates
mobilities. The creeping ability or capacity of the “expandable mutability”59 of surveillance
technologies contributes to these restrictions. Surveillance, as we have seen in the first chapter, is
indeed intensified in a world of remote relations, unlike the direct contact of earlier times. For Lyon,
many connections and relations today “do not directly involve co-present embodied persons, and
[…] no longer see the face of those with whom we are “in contact” or with whom we engage in
exchange.”60 This type of virtual existence continues and has further implications if people are
represented only by data abstracted from them with no reference to themselves as a living, embodied
person. Likewise, the remaining problem, as Lyon rightly notes, is that the data created as coded
categories are not innocent or harmless. For as Lyon observes, as data circulate, “they serve to open
and close doors of opportunity and access […and] affect eligibilities for credit or state benefits and
54 Lyon, Surveillance Society: Monitoring Everyday Life, 27. 55 Lyon, Surveillance Society: Monitoring Everyday Life, 35. 56 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 17. 57 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 18. 58 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 18. 59 The term “expandable mutability” is coined by Norris and Armstrong to refer to “the capacity of surveillance
cameras, installed for one purpose, ending up carrying out other tasks also.” Andrew McStay, The Mood of
Information: A Critique of Online Behavioural Advertising (New York: Continuum, 2011), 76. Cf. Clive
Norris and Gary Armstrong, The Maximum Surveillance Society: The Rise of Cctv (London: Berg, 1999), 58. 60 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 27.
Power Distance and Social Sorting
155
they bestow credentials or generate suspicion.”61 The relation between the abstracted data and the
embodied social persons, therefore, must be at the forefront of this discussion.
Given that the new organizational workplace is one of the most prominent surveillance-implemented
arenas today, where electronic-digitalized technologies are frequently and systematically employed,
the above discussed theme of social sorting can be usefully applied and analysed in that context.
Systems of surveillance track employees’ positions in time and space and distinguish employees who
are ‘working hard’ from those who are ‘not pulling their weight,’ creating a stratification.62 Here,
individuals may come to be seen differently by themselves and by others, which may in turn lead to
physical and mental illness and other health hazards, such as “increased boredom, high tension,
extreme anxiety, depression, anger severe fatigue and musculoskeletal problems.”63 Researchers
continuesly demonstrate the depression and precarity emerging in environments of overly invasive
surveillance.64 Bahaudin G. Mujtaba stresses this adverse aspect of monitoring very well, claiming
that “this surveillance can inject an air of suspicion and hostility into the workplace […], can be
counterproductive as it can cause resentment in employees at being treated like children [… and] the
culture can become one of a mistrust and hostile work environment when employees do not see the
justification of monitoring.”65 Apart from the unilateral focus on individual rights by scholars who
overlook the social impact of workplace surveillance, the following section analyses the fundamental
social challenges and implications of surveillance, making particular reference to “social sorting” as
a way in which surveillance goes has significance beyond individual privacy concerns in the
workplace.
4.2 WORKPLACE SURVEILLANCE AND EMPLOYEE SORTING
In all societies with modern informational infrastructures, surveillance happens and is “seen in terms
of an intensified attention to personal data and a desire to influence everyday life.”66 Though earlier
nation-wide rational surveillance was installed to “instil rational discipline and to create order,”
contemporary rational surveillance practices go beyond this and “slips into simulation mode,”67 thus
having effects in all life chances. The surveillance gaze is more enhanced and affected in the
organizational workplace and encompasses all spheres of work-life beyond any limits of the here and
now. Deskilling and the disciplining of labour were the source of workplace surveillance in the early
twentieth century, when the fragmentation of tasks, regimentation of work and subsequent
subordination of labour to capital and profit became the prime motive.68 In relation to the context of
the call centre, Kirstie Ball calls electronic surveillance “the technological whip of the electronic
age,” because of its strong implication that essentially of control.69 Likewise, the power of this
surveillance in the workplace and its subsequent effect of “panopticon is not just embodied in its
61 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 27. 62 Graham Sewell and James R. Barker, “Coercion versus Care: Using Irony to Make Sense of Organizational
Surveillance,” The Academy of Management Review 31, no. 4 (2006): 934-961. 63 Kirsten Martin and R. Edward Freeman, “Some Problems with Employee Monitoring,” Journal of Business
Ethics 43, no. 4 (2003): 354. 64 Phoebe Moore and Lukasz Piwek, “Regulating Wellbeing in the Brave New Quantified Workplace,”
Employee Relations 39, no. 3 (2017): 311; Phoebe Moore and Andrew Robinson, “The Quantified Self: What
Counts in the Neoliberal Workplace,” New Media and Society 18, no.1 (2016): 2774-2792. 65 Bahaudin G. Mujtaba, “Ethical Implications of Employee Monitoring: What Leaders Should
Consider,” Journal of Applied Management and Entrepreneurship 8, no.3 (2003): 37. 66 Lyon, Surveillance Society: Monitoring Everyday Life, 35. 67 Lyon, Surveillance Society: Monitoring Everyday Life, 35. 68 Zureik, “Theorizing Surveillance: The Case of the Workplace,” 31. 69 Kirstie Ball, “Categorizing the Workers: Electronic Surveillance and Social Ordering in the Call Center,” in
Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, ed. David Lyon (London:
Routledge, 2003), 203.
Power Distance and Social Sorting
156
ability to subject all to a surveillance gaze, but in the ability to link observation to a named subject
through an individualized record, which can then be used for the purposes of identification,
bureaucratic codification, and eventual classification.”70 This type of ensuing categorization through
profiling has adverse effects on employees, as it tends to give rise to categorical suspicion.
The problem of ethnic or other forms of profiling and categorical suspicion also reminds us of the
implied issue of making valid judgements about people based on their appearances. For “appearance
is readily manipulated, may legitimately change from one situation to another, and without adequate
knowledge of cultural, local and context may be enigmatic or unreadable.”71 The possibility of
deceiving the watched is thus foreseen, and this also, on the contrary, presupposes an adequate prior
ability to interpret the same with precision. This prior knowledge, however, is problematic as it is
“[…] incomplete and is also likely to be bundled up with stereotypes of others (and Others) that are,
at best, superficial and partial and, at worst, wrong.”72 Richard Jenkins sums up the challenges
encompassed within the watcher’s capacity to interpret the collected and stored data, stating that
they:
[…] (a) lack one of the most important sources of information that we routinely use to identify
people, i.e. language and specifically, conversational inquiry; (b) rely on their individual and
cultural prior knowledge, with all of its inadequacies, not least its stereotypical nature, to interpret
appearances; and (c) also depend on a different kind of prior knowledge, intelligence, with all of
its shortcomings. As a result, their capacity to know “who’s who,” and consequently “what’s
what” is likely to be problematic, at best.73
In this context, Jenkins argues, there seems to be a problem for both the watched and the watchers
concerning the validity of data stored and its interpretation. This functions to render employees
reputationally vulnerable through the theft of their identities (phishing). Similarly, the epistemic
effects of forms of surveillance that aim to classify and differentiate human conduct have important
ramifications for employees who are “subjected to numerous forms of scrutiny and measurement that
render them […] – ‘good’ or ‘bad,’ ‘compliant’ or ‘recalcitrant,’ ‘effective’ or ‘non-effective,’ etc.”74
In what follows, we consier the highly discriminative effects of organizational surveillance.
4.2.1 Statistical Surveillance and Discrimination
Statistical surveillance functions in various areas of human life, such as in business institutions.
According to Oscar H. Gandy, it signifies “the role of data and statistical analysis in the identification,
classification and representation of social reality […].”75 It places individual employees “within a
dynamic multidimensional matrix of identities” in a work context and often “reflects the interests of
the institutional actors seeking to influence how individuals understand and respond to the options
set before them.”76 It also determines and increasingly assists in the process of modern surveillance
70 Clive Norris, “From Personal to Digital: CCTV, the Panopticon, and the Technological Mediation of
Suspicion and Social Control,” in Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination,
ed. David Lyon (London: Routledge, 2003), 256. 71 Richard Jenkins, “Identity, Surveillance and Modernity,” in Routledge Handbook of Surveillance Studies,
eds. Kirstie Ball, Kevin D. Haggerty and David Lyon, 159-166 (Oxon: Routledge, 2014), 163. 72 Jenkins, “Identity, Surveillance and Modernity,” 163-164. 73 Jenkins, “Identity, Surveillance and Modernity,” 164. 74 Graham Sewell, “Organization, Employees and Surveillance,” in Routledge Handbook of Surveillance
Studies, eds. Kirstie Ball, Kevin D. Haggerty and David Lyon, 303-312 (Oxon: Routledge, 2014), 304. 75 Oscar H. Gandy, Jr, “Statistical Surveillance: Remote Sensing in the Digital Age,” in Routledge Handbook
of Surveillance Studies, eds. Kirstie Ball, Kevin D. Haggerty and David Lyon, 125-132 (Oxon: Routledge,
2014), 125. 76 Gandy, “Statistical Surveillance: Remote Sensing in the Digital Age,” 125.
Power Distance and Social Sorting
157
and identification systems “to link names and other unique identifiers to markers or traces from
individuals who would otherwise be anonymous […].”77 It is important to note here that this
identification is part of a statistical determination and is done largely by institutional others. Thus it
is mainly informational and alters the life chances of individuals. Besides, through statistical data
analysis, employees are made part of various analytically determined groups. This is done by a
simultaneous maximization of both similarities and differences.78 This means that, in a workplace,
the personal or autonomous choices of employees do not possess any assigning power, as one’s
membership in a group is statistically determined.
It has been noted that “surveillance, the systematic watching of people – a means to an end, one-
sided, increasingly impersonal, intrusive and yet distant, routine and banal – has come to frame
individual and collective identification in the modern human world.”79 This again reminds one of the
reductionist arguments raised against surveillance and may lead one to perceive this reductionism as
a form of determinism. However, within the contexts of the organizational workplace, an evaluative
assessment by a powerful actor basically demands a choice between individual employees and
groups, and thus discrimination happens due to the subject’s inability to intervene in the process. The
concept of statistical discrimination is thus used “to characterize a decision to exclude or deny
opportunity to an individual on the basis of the attributes of the group to which he or she is assumed
to belong.”80 Gandy uses the term “segmentation” to designate the activity by which statistical
discrimination is accomplished. According to him, segmentation refers to “the classification of the
objects of analysis into distinct categories on the basis of their relative status as objects of interest,
as well on the basis of their statistically determined linkages or associations with costs, benefits and
risks.”81 Employees are often granted or denied various opportunities based on this statistical data.
To process this action, a powerful actor targets the subjects through specialized communications and
requires unregulated assess to information about the status and activities of employees in different
contexts. The ethical issues implied here are many, ranging from reductionism to the forgetfulness
of human uniqueness and the need for a principled code of behaviour.
In addition to this, one of the main characteristics of statistical surveillance is its remoteness in
distance, time and manner, in which respect it differs from direct or indirect visual or auditory
surveillance.82 Here the transaction-generated information is combined with other digitally encoded
information and serves to regulate interactions and other activities in the workplace. In this
surveillance, which is “panoptic in the sense of its inclusive ‘field of view,’ very little […] sensing
will take place under the active control of human agents.”83 This will produce adverse effects, such
as increasing the development of profiling. Moreover, statistical surveillance, through its statistical
packages or algorithms, including “rule engines,” “expert systems” or data mining tools, transforms
mountains of data into “statements” or “graphic representations.” It makes predictions about
employee behaviours, but these could be “in error because of irregularities in the systems and
routines that capture information about individuals [… and] because of biases inherent in the
77 Gandy, “Statistical Surveillance: Remote Sensing in the Digital Age,” 126. 78 Gandy, “Statistical Surveillance: Remote Sensing in the Digital Age,” 126. 79 Jenkins, “Identity, Surveillance and Modernity,” 165. See also, Lyon, The Culture of Surveillance, 2-9. 80 Gandy, “Statistical Surveillance: Remote Sensing in the Digital Age,” 126. The act of discrimination
associated with workplace surveillance is illustrated by various researchers like: Jenkins, “Identity,
Surveillance and Modernity.” 159-166: Ball, “Workplace Surveillance: An overview,” 87-106; Ball, Kirstie
S. and Stephen T. Margulis. “Electronic Monitoring and Surveillance in Call Centres,” 113-126; Lyon,
“Surveillance, Security and Social Sorting,” 161-170. 81 Gandy, “Statistical Surveillance: Remote Sensing in the Digital Age,” 127. 82 Gandy, “Statistical Surveillance: Remote Sensing in the Digital Age,” 127. 83 Gandy, “Statistical Surveillance: Remote Sensing in the Digital Age,” 127.
Power Distance and Social Sorting
158
selection of measures.”84 The adverse effect of statistical surveillance also involves the differential
treatment of employees, to the extent that they are categorically placed into disfavoured groups.
Human subjectivity itself becomes a matter of a reductionist plot in this perceived disparity, and one
forgets to emphasise the whole together with its constituent parts. This also leads to a shift in the
focus of surveillance from work (performance, in terms of productivity) to persons (the active agent
himself or herself) and also shifts the discussion from a focus on the embodied person to a focus on
disembodied information about a person. This will be elucidated in the following section.
4.2.2 From Embodied Persons to Disembodied Information
Today’s digitalized forms of surveillance, according to Irma van der Ploeg, have increasingly
extended its focus on people’s body (by scrutinizing, identifying, and assessing) and “brought forth
an unequalled pervasiveness and intensity, an unprecedented number of ways in which bodies can
be monitored, assessed, analysed, categorized, and, ultimately, managed.”85 It does not regard the
person or individual in his or her totality; when one speaks only in terms of the body of a person,
one’s approach is too reductionist. Likewise, electronic or digitalized surveillance practices in the
workplace translate physical bodies into digital code, and there emerge new bodies defined in terms
of mere information. These bodies of digitally processable data are easily amenable to different forms
of analysis and categorization.86 Kevin Haggerty and Richard Ericson write, in this regard, that any
observed body, which is of a hybrid composition, “is broken down by being abstracted from its
territorial setting” and then reassembles through data flows, resulting in generation of a
decorporealized body, “a ‘data double’ of pure virtuality,” and a cyborg – “a flesh-technology-
information amalgam.”87 This shows that a new type of body is formed, transcending human
corporeality, reducing flesh into mere information and appearing as a ‘data double,’ a double which
involves “the multiplication of the individual, the constitution of an additional self.”88 This also refers
back to the previously discussed (first chapter) reductionist challenges of employee surveillance.
In addition to this challenge, as Lyon illustrates, surveillance, as it happens today mainly
electronically, concerns only information fragments abstracted from individuals, which in turn stress
the disembodied nature of the gathered information.89 His wide and deep research on the subject
shows that in various domains and spheres of the activities of any society, ranging from work to
leisure, the generation, collection, and processing of ‘body data’ is increasing.90 However, Lyon’s
definition of surveillance as the “collection and processing of personal data, whether identifiable or
not, for the purposes of influencing or managing those whose data have been garnered […] does not
usually involve embodied persons watching each other,”91 is nothing but an indication of a kind of
personification of information. This shows the emergence of new social categories that intertwine
84 Gandy, “Statistical Surveillance: Remote Sensing in the Digital Age,” 128. 85 Irma van der Ploeg, “The Body as Data in the age of Information,” in Routledge Handbook of Surveillance
Studies, eds. Kirstie Ball, Kevin D. Haggerty and David Lyon, 176-183 (Oxon: Routledge, 2014), 177. 86 Ploeg, “The Body as Data in the age of Information,” 177. 87 Kevin Haggerty and Richard Ericson, “The Surveillance Assemblage,” in The Surveillance Studies Reader,
eds. Sean P. Hier and Josh Greenberg, 104-116 (Berkshire, England: McGraw-Hill, 2007), 109. 88 Haggerty and Ericson, “The Surveillance Assemblage,” 109. Originally in, Mark Poster, The Mode of
Information: Poststructuralism and Social Context (Chicago: University of Chicago Press, 1990), 97. 89 Lyon, Surveillance Society: Monitoring Everyday Life, 38. 90 Lyon, Surveillance Society: Monitoring Everyday Life, 38-39. For example, law enforcement is the one of
the largest domains “traditionally concerned with the legitimate enrolment of individual bodies in the process
of generating, storing and processing of (identifying, physical) information […].” Irma van der Ploeg,
“Biometrics and the Body as Information: Normative Issues of the Socio-Technical Coding of the Body,” in
Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, ed., David Lyon (London:
Routledge, 2003), 62. However, the effects of these practices are both transforming and challenging. 91 Lyon, Surveillance Society: Monitoring Everyday Life, 2.
Power Distance and Social Sorting
159
individual physical characteristics with information systems, producing a dichotomy between
embodied physical identity or existence and the information or physical characteristics of embodied
persons.92 In this situation, it is essential to consider how this monitored or collected ‘information of
the body’ affects the embodiment and identity of the individual self.
Speaking of an emerging “assemblage” characterizing a rhizomatic structure in regard to new
surveillance, Haggerty and Ericson write that, “at the centre of surveillance are attempts to capture
the human body,” and continue to speak about the above mentioned “decorporealization” of the body
that happens “through its reconfiguration into binary digits (bits) of information and its hybridity
with machines.”93 As embodiment remains the most basic experience of ‘being in the world,’ the
convergence of body as an ‘ontology of information’ has profound normative and moral
implications.94 For this body ontology, as Ploeg illustrates, “redefines bodies in terms of, or even as,
information [… that] quite explicitly construe the body in terms of flows of information and
communication patterns.”95 The body is perceived as a collection of discrete pieces of information,
unlike the Foucauldian treatment of it as a unitary entity.96 This body ontology, which sees the body
as information, has normative implications, since the generation and processing of ‘body data’ is
highly vulnerable to data misuse and information manipulation. Therefore, in a nutshell, the
discussion of the issue of ‘privacy’ alone is an inadequate way to deal with the larger issues arising
from the proliferation of personal information in searchable databases and other electronic storage
systems.97 Continuing in the same line, Lyon states, “if it is correct to mount a critique of surveillance
on the analysis of the disappearing body and the vanishing face, then only remedies that refer to the
body and the face will do.”98 This will be further critically analysed and ethically responded to in the
final part of this section. The next section considers another adverse practice of surveillance –
namely, “at risk” categorization - of employees that is often done in a prejudiced or predetermined
manner.
4.2.3 Surveillance Creep and “At Risk” Categorization
Contemporary surveillance technology and its key component, the searchable database, according to
David Lyon and Felix Stalder brings with it a “New Penology”: they write, “[w]hile the Old Penology
tried to identify criminals to ascribe guilt and blame and to impose punishment and treatment, the
New Penology seeks techniques for identifying, classifying, and managing groups sorted by levels
of dangerousness.”99 As they continue, “individualized suspicion with reasonable cause gives way to
categorical suspicion where, […] even intending employees may be tested to discover drug use.”100
An example could be derived from the development of DNA tests, by which “revealing information
about health and predisposition […] can expose a person to the workplace […] creating categories
92 van der Ploeg, “Biometrics and the Body as Information,” 58. 93 Zureik, “Theorizing Surveillance: The Case of the Workplace,” 41. 94 van der Ploeg, “Biometrics and the Body as Information,” 59. 95 van der Ploeg, “Biometrics and the Body as Information,” 64. The anatomy and later added physiology
function as building blocks of this ‘body ontology’ and thus it is a historical construction. With modern
technology representation, emerged a new body ontology – “the modern body,” – laying down the anatomical
discourses, and acted upon the very nature of our bodies. This notion of “new body was subsequently
performed through and in the fast-proliferating practices, discourses, technologies, and architectures of
medicine, law, education, public policy, etc., thus gradually and fundamentally altering the experience of
being embodied.” van der Ploeg, “Biometrics and the Body as Information,” 65. 96 Zureik, “Theorizing Surveillance: The Case of the Workplace,” 41. 97 Lyon, “Facing the future: Seeking ethics for everyday surveillance,” 171. 98 Lyon, “Facing the future: Seeking ethics for everyday surveillance,” 171-172. 99 Felix Stalder and David Lyon, “Electronic Identity Cards and Social Classification,” in Surveillance as Social
Sorting: Privacy, Risk, and Digital Discrimination, ed., David Lyon (London: Routledge, 2003), 89. 100 Stalder and Lyon, “Electronic Identity Cards and Social Classification,” 89.
Power Distance and Social Sorting
160
of those ‘at risk’.”101 The data could be further used to reinforce ethnic or other such stereotypes.
Kevin D. Haggerty, in this regard, compares this type of surveillance, in line with the panoptic model
of hierarchy, to the functioning of a microscope. So-called “marginalized” or “dangerous” persons
or groups are always under the unidirectional gaze and scrutiny of the powerful, who are often
invisible.102 This means that, in the workplace, biographical and various ethno-demographical data
of employees are used to profile them in terms of probabilities and possibilities about the future.
Often, every one of them is assumed to be ‘guilty’103 until the risk channelizing system says
otherwise.
Electronic surveillance as a primary means of reducing employee risks in the workplace also classify
all employees for risk assessment and put them in a position of being subject to unwanted
observation. This means that, although it attempts risk minimization by identifying law-breakers, its
huge databases facilitate these classified categories for a variety of purposes, placing the innocent
under suspicion, and thus risks their further life chances.104 In this way, workplace surveillance
creates further categories of suspicion among the workforce. Categorization, by which those who are
classified experience an interrupting intervention in their social world, can never be a neutral process
and, as Lyon observes, it often has further unintended consequences such as coercive social control,
as we have already discussed, and transforms into a process of “contingent categorization,”105 subject
to various external determinations. This suspicion encourages one to freeze the exercise of civil
liberties and increase power distance, leading to discriminative or coercive practices and a kind of
selective enforcement of rules and norms. It increases, for the watcher, the power to persuade the
watched – augumenting his or her known/unknown influence or control –and leads further to
blackmail and manipulation of people’s vulnerabilities, leads them to succumb by retargeting,106 and
produces imbalances in proactive power reflection.
However, my contention is that ‘suspicious behaviour’ was not the only important way in which the
subjects of surveillance are chosen. Many employees are surveilled for no reason. A study of Clive
Norris and Gary Armstrong reveals that 36 percent of people were subject to continued surveillance
for “no obvious reason” and 34 percent were surveilled because they belonging to a particular social
or subcultural group.107 Since the proportion of people who were targeted for surveillance due to
their behavioural pattern is only 24 percent, and since unwarranted suspicion in no way falls equally
on all social or cultural groups, Norris and Armstrong conclude that “[a]s this differentiation is not
based on objective behavioural and individualized criteria, but merely on being categorised as part
of a particular social group, such practices are discriminatory.”108 In this way, categorical suspicion
not only intensifies the gaze of those who have already been marginalized, but increases
101 Dorothy Nelkin and Lori Andrews, “Surveillance Creep in the Genetic Age,” in Surveillance as Social
Sorting: Privacy, Risk, and Digital Discrimination, ed., David Lyon (London: Routledge, 2003), 95. 102 Kevin D. Haggerty, “Tear Down the Walls: On Demolishing the Panopticon,” in Theorizing Surveillance:
The Panopticon and Beyond, ed., David Lyon, 23-45 (Cullompton: Willan publishing, 2008), 29. 103 Wright et al., “Questioning Surveillance,” 290. 104 Lyon, “Facing the future: Seeking ethics for everyday surveillance,” 172. 105 Lyon, “Facing the future: Seeking ethics for everyday surveillance,” 173. Contingent categorization
emphasizes “the flexibility of the information processing system in its response to important contextual
factors and describes empirical procedures useful in identifying categorization processes.” Joel B. Cohen and
Kunal Basu, “Alternative Models of Categorization: Toward a Contingent Processing Framework,” Journal
of Consumer Research 13, no. 4 (1987): 455. 106 Neil M. Richards, “The Dangers of Surveillance,” Harvard Law Review 126 (2013): 1955. 107 Norris, “From Personal to Digital,” 266. See, Clive Norris and Gary Armstrong, The Maximum Surveillance
Society: The Rise of CCTV (Oxford: Berg, 1999), 112-113. 108 Norris and Armstrong, The Maximum Surveillance Society: The Rise of CCTV, 150.
Power Distance and Social Sorting
161
stigmatization.109 Thus, in a workplace context, exclusionary strategies are intensified. These
previously discussed effects of the disappearing body and face are further analysed below within the
framework of electronic mediation.
4.2.4 Electronic Mediation and Face/Facelessness
The increase in electronic or digital surveillance, with its capacity to do things at a distance,
accentuates the swiftness of disappearing bodies in this modern technocratic era. Previous sessions
show that, with information systems, our day-to-day lives invariably produce an increased mediation
of our identities as citizens, workers, etc. This happens through the interconnection of our bodies
through digitization, which can be called electronic mediation. Analysing both CCTV systems and
focusing on suspicion and social control in the digital age, Norris argues that “with digital systems
there is the potential to transform radically the nature of decision-making that can both bypass the
need for human mediation of the cameras and significantly reduce the need for human intervention
at all.”110 One of the drawbacks of this digital mediation is the “danger that our judgement falls prey
to stereotypical prejudice and results in the dehumanization of the other.”111 In other words,
embodied persons, and the concept of ‘co-presence’ – “being in the same place with someone else”
- have been vanishing as modes of interaction have been altered.112 In the same way, remote relations,
neglecting involvement of co-present embodied persons, also negates the possibility of being “in
contact” with others for social exchanges. Many social interactions are now facilitated and arbitrated
by electronic means, and thus relationships are now possible without co-presence.
New surveillance thus creates a new personhood in the workplace, such that “in the contemporary
surveillance situation, the digital persona seems to pass as a representation of the subject for some
purposes, the body can be genetically or biometrically interrogated without speech, and places are
only fleetingly occupied.”113 This confirms that everyone who passes under this digitized gaze of
surveillance can be classified as “lawbreaker/law-abiding,” “suspected/unsuspected,” “wanted/not
wanted,” and so forth, and this sorting no longer relies on face-to-face knowledge or interaction but
only on the data inscribed in the recorded database.114 Lyon here doubts the ethical standpoints of
surveillance that neglect or circumvent the required or anticipated relations of coded data with
embodied social persons and thus illustrates the facelessness that results, which is exacerbated by
this electronic mediation.115 This missing face raises new ethical concerns in the workplace.
Moreover, the classification of employees according to the data obtained, as Lyon fears, is
pernicious116 and results in differential treatment of employees. Referring to this, Soraj Hongladarom
writes:
If the data show that the employee only seems to be predisposed to neglecting to work diligently,
then this could be a cause for discrimination, even though there is no direct evidence that the
employee in question has really neglected the work. The employee might be a competent worker
who works fast, but is fond of relaxing in a chat forum. There might be no real indication that the
109 Norris, “From Personal to Digital,” 266. 110 Norris, “From Personal to Digital,” 274. 111 Norris, “From Personal to Digital,” 251. 112 Lyon, Surveillance Society: Monitoring Everyday Life, 15-16. 113 Lyon, Surveillance Society: Monitoring Everyday Life, 19. 114 Norris, “From Personal to Digital,” 270. 115 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 27. 116 Lyon, “Facing Future: Seeking Ethics for Everyday Surveillance,” 173.
Power Distance and Social Sorting
162
employee is an irresponsible worker, but the data obtained might be interpreted differently by the
employer.117
This remark indeed shows that the issue is a matter of serious concern in the analysis of workplace
surveillance. More in this regard is expressed by Lyon, who states that when new surveillance
systems are employed that can do things at a distance, the resultant data becomes the source and
means of judgements on a person or group and there emerges a delinquency of moral distancing.118
Strictly speaking, this moral distancing, through this virtual gaze, does away with moral solidarity.
For as previously discussed, technological mediation, by contributing to a simultaneous visibility-
invisibility contrast, dilutes responsibility.119 This means that electronic mediation, often through
searchable databases and video capturing, in fact erodes the relation between the self and the other,
and thus the sociality of each individual is threatened.120
Another emerging problem of the present data-driven economy is the commodification of digital
identities.121 The personal data of individuals represent a monetary value in the market, and data and
profiling algorithms represent a new organizational asset.122 The commodification of consumer data
in this era is common and widespread and is becoming more easily accessible to many companies,
who use it for commercial purposes.123 The same fate often affects the data of employees in
organizations. For through the digitalization of employee data, as we have seen, there arises a
possibility that this data will be manipulated of used excessively by organizations.124 Collecting and
using of employees’ health data is an example of this manipulative use. For instance, a Fitbit or
iPhone app tells an employer how much an employee has exercised, what her heart rate is, or how
high her blood sugar levels are. Employers can make key decisions based on employees’ biometric
data, collected from specialized devices like these, and the potential misuse of these data will always
exist.125 Elizabeth A. Brown states, on this point, that “gathering employee data from health
monitoring devices and apps provides a substantial benefit to employers and poses substantial risks
to employees.”126 Employees thus become increasingly vulnerable to data breaches through data
manipulation, cyberattacks and other malpractices of those who hold their data. This type of
discussion raises the prospect of possible or actual gender biased discrimination in the workplace.
4.2.5 Gender-Based Discrimination (the Male Gaze)
When we discuss gender in the context of the workplace, it is generally held that “gender is
inextricably interwoven into our images of authority,”127 and thus that women are subject to
subordination. According to Hille Koskela, “[g]ender is embedded in a complex range of relations
where power and repression are associated with the exercise of surveillance. […] Today, surveillance
117 Soraj Hongladarom, “Electronic Surveillance in the Workplace: A Buddhist Perspective,” 213. 118 Lyon, “Facing the future: Seeking Ethics for Everyday Surveillance,” 173-174. 119 Lyon, “Facing the future: Seeking Ethics for Everyday Surveillance,” 174. 120 Lyon, “Facing the future: Seeking Ethics for Everyday Surveillance,” 179. 121 Gianclaudio Malgieri and Bart Custers, “Pricing Privacy – The Right to Know the Value of Your Personal
Data,” Computer Law & Security Review 34 (2018): 289-303. 122 Malgieri and Custers, “Pricing Privacy – The Right to Know the Value of Your Personal Data,” 290. 123 Stacy-Ann Elvy, “Commodifying Consumer Data in the Era of the Internet of Things,” Boston College Law
Review 59, no. 2 (2018): 423-522. 124 Shah, “Report of the Group of Experts on Privacy,” 10. 125 Elizabeth A. Brown, “The Fitbit Fault Line: Two Proposals to Protect Health and Fitness Data at Work,”
Yale Journal of Health Policy, Law, and Ethics 16, no. 1 (2016): 5. 126 Brown, “The Fitbit Fault Line: Two Proposals to Protect Health and Fitness Data at Work,” 5. 127 Randi Markussen, “Constructing Easiness – Historical Perspectives on Work, computerization, and
Women,” in The Cultures of Computing – Sociological Review Monograph, ed. Susan Leigh Star (Oxford:
Blackwell, 1995), 178. See, Zureik, “Theorizing Surveillance: The Case of the Workplace,” 50.
Power Distance and Social Sorting
163
helps to reinforce sexual norms by creating pressures for self-regulation. The operation of
surveillance is also full of male assumptions and assorted gendered dynamics.”128 In the same way,
researchers such as Koskela recognize that “the gendered nature of power relations” matter in the
discussion of surveillance and gender, not so much notions of sexual qualities or biological
essence.129 For “gender is hard to escape,” and bodily appearances can make people “prisoners of
those gendered bodies”; they can be “judged” by others on this basis.130 Likewise, drawing on
Foucault, Koskela identifies a connection between bodies, space and power, which is crucial in
maintaining control, where the visibility of the body becomes a vital element. For instance, vision
being an essential element, video surveillance makes the experience of “being watched” highly
gendered, for without any ties to security and crime control such video monitoring can be a powerful
site for the expression of gendered desires (often voyeuristic attention) and increases the “being-
looked-at-ness” of being a woman.131 In relation to CCTV and video monitoring, Galič, Timan and
Koops referring to David Lyon, state that “despite increased reliance on software and protocol, social
sorting still occurs often as a result of a white, male gaze in the CCTV control room, having a
particular bias that leads to certain profiles of deviance.”132 This type of voyeuristic surveillance
gaze, therefore, turns out to be a gendered targeting of surveillance systems experienced in the
workplace.
According to Elia Zureik, the unwanted male gaze is the source of gender-based surveillance in the
workplace. “[S]urveillance and privacy,” she writes, “are associated with authority structures, body
representations, and consequent sexual harassment and discrimination.”133 For instance, analysing
the study of Jeffrey Rosen concerning e-mail use in the workplace, Zureik states that “the intersection
of gender and e-mail has revolved around cases of sexual harassment, with implications for
discrimination.”134 Koskela, likewise, referring back to video surveillance and of the view that it is
justified by the need for security and protection, writes that “[t]he prominent desire to use video
surveillance to increase security is complicated by the particularly pernicious tendency of the gaze
to turn the body into sexualized object without a mutual commitment to such sexualization. […] So,
for women in particular, being an object of surveillance does not necessarily or uniformly foster a
reassuring sense of security.”135 Workplace surveillance consequently produces a deep feeling of
insecurity among women and reinforce their sense of being constantly looked at. Thus they are
“paradoxically marginalized while being at the centre (of the gaze), something that reproduces the
embodiment and sexulization of women.”136 Koskela also points to the possible misuse of
surveillance tapes,137 thus illustrating instances of surveillance that remain oppressive, produce
unequal power relations, and lead women to worry about becoming the victim of a “Peeping Tom.”
128 Hille Koskela, “You Shouldn’t Wear that Body: The Problematic of Surveillance and Gender,” in Routledge
Handbook of Surveillance Studies, eds. Kirstie Ball, Kevin D. Haggerty and David Lyon, 49-56 (Oxon:
Routledge, 2014), 49. 129 Koskela, “You Shouldn’t Wear that Body: The Problematic of Surveillance and Gender,” 49. 130 Koskela, “You Shouldn’t Wear that Body: The Problematic of Surveillance and Gender,” 56. 131 Koskela, “You Shouldn’t Wear that Body: The Problematic of Surveillance and Gender,” 51. 132 Maša Galič, Tjerk Timan and Bert-Jaap Koops, “Bentham, Deleuze and Beyond: An Overview of
Surveillance Theories from the Panopticon to Participation,” Philosophy & Technology 30, no. 1 (2017): 28. 133 Zureik, “Theorizing Surveillance: The Case of the Workplace,” 50. 134 Zureik, “Theorizing Surveillance: The Case of the Workplace,” 51. Jeffrey Rosen, The Unwanted Gaze:
The Destruction of Privacy in America (New York: Vintage Books, 2000), 80. 135 Koskela, “You Shouldn’t Wear that Body: The Problematic of Surveillance and Gender,” 52. 136 Koskela, “You Shouldn’t Wear that Body: The Problematic of Surveillance and Gender,” 53. 137 Koskela, “You Shouldn’t Wear that Body: The Problematic of Surveillance and Gender,” 53-54.
Power Distance and Social Sorting
164
Researching and examining ‘time-space surveillance’138 and the ensuing ‘gender dynamics’
embedded in this practice of surveillance in the work place, David L. Collinson and Margaret
Collinson expose its increasingly adverse and disproportionate effects on women relative to men and
the emerging ‘macho’ culture, which is often manifested in assertive and often aggressive
expressions of masculinity.139 Referring to Anthony Giddens’ claim that “modern organizations […]
involve the intensification of surveillance as a means of accumulating, collating and retrieving
information so as to maximize control over space-time,”140 Collinson and Collinson express the effect
of a calculative division of time and space on social control and its tendency to endanger women
workers. For example, the blurring of private (home) and public (work) life becomes problematic for
women workers as “[t]he world of work encroaches on the home life in a gendered fashion.”141 The
research of Collinson and Collinson suggests that monitoring practices have particularly adverse
effects on women worker’s ability to maintain balance between the spatio-temporal pressures of work
and home.142 They observe that:
the growing requirement to subordinate ‘personal’/ ‘private’ concerns to those of the corporation
indicates that organizations may be increasingly concerned to collapse the distinction between
home and work, […]. By continue to erode ‘free time’, capitalist organizations […] are breaking
down the time-space differentiation between office and domicile. Surveillance practices often
render ‘public’, time and space previously as ‘private’.143
The gendered consequences of time-space monitoring is therefore due to the intensified work
demands that make it difficult for women to simultaneously manage both home and work. Women
are also being marginalized as they internalize the panoptical gaze of the male authority. Women live
their bodies in the organization as “seen by another, by an anonymous patriarchal Other,”144 and this
subjective experience further evokes feelings of embarrassment, shame and fear. It is clear that this
type of discrimination is also intimately involved with a commercial appeal in the exercise of power.
The following section, therefore, deals with surveillance and the concept of power culture in
organizational life.
4.3 SURVEILLANCE, ORGANIZATIONAL LIFE AND POWER CULTURE
The word surveillance also covers surreptitious investigations into individual activities. A transition
is experienced in the workplace from simple to technical and bureaucratic forms of control, much
138 The interconnections between time and space, within the scope of this study, is taken here as socially
constructed and argues that “the command over space as well as time is a key element in social control […].”
David L. Collinson and Margaret Collinson, “Delayering Managers: Time-Space Surveillance and its
Gendered Effects,” Organization 4, no. 3 (1997): 381. 139 Collinson and Collinson, “Delayering Managers: Time-Space Surveillance and its Gendered Effects,” 375-
407. The concept ‘macho’ is used to describe men who are very proud of their masculinity. However, macho
culture is generally a male dominated trend with a strong sense of power or the right to dominate - women -
manifested in an assertive, self-conscious, or controlling way. William Safaire illustrates it in line with
American political usage that it refers to the “[…] condescension of the swaggering male; the trappings of
manliness used to dominate women and keep them ‘in their place’ […].” William Safire, Safire's New
Political Dictionary: The Definitive Guide to the New Language of Politics (New York: Random House,
1993), 427. 140 Collinson and Collinson, “Delayering Managers: Time-Space Surveillance and its Gendered Effects,” 389.
See, Anthony Giddens, Social Theory and Modern Sociology (Cambridge: Polity Press, (first published,
1987), 2007. 141 Zureik, “Theorizing Surveillance: The Case of the Workplace,” 50. 142 Collinson and Collinson, “Delayering Managers: Time-Space Surveillance and its Gendered Effects,” 401. 143 Collinson and Collinson, “Delayering Managers: Time-Space Surveillance and its Gendered Effects,” 401. 144 Angela Trethewey, “Disciplined Bodies: Women’s Embodied Identities at Work,” Organization Studies 20,
no. 3 (1999): 425.
Power Distance and Social Sorting
165
advanced by the use of computerized monitoring.145 Organizational surveillance, as the “new
meticulous rituals of power often appear as the technological progeny of the ‘panopticon’ in that they
often operate in a hidden or random fashion, leaving those under their scrutiny supposedly
internalizing the ‘gaze’ of the authorities and thus rendering themselves docile.”146 This panopticon
metaphor also acknowledges the vulnerability of employees due to its visibility and psychological
effect on employees, which is often magnified by the invisibility of the observer.147 Unlike control
through direct visual monitoring of an agent, new mechanisms of electronic-computerized
surveillance allow management or employers to control the bodies of workers more efficiently and
in a more routinized way.148 Hence, workplace surveillance can be accepted or rejected depending
on whether one judges it to be a legitimate technology that allows managers to care for everyone’s
interests, or rather a powerful instrument of managerial coercion149 and employee subordination.150
Sewell and Barker explore the nuances of the conceptual opposition between ‘coercion’ and ‘care’
to make sense of organizational surveillance.
The concept of ‘coercion’, as an action or practice of compelling someone to do something using
force or threats, presents a radical perspective on organizational surveillance. The concept of ‘care’,
by contrast, is understood as an effort to do something correctly, safely, or without causing damage
and seen as a more liberal perspective on the same.151 However, care indicates, in this context, the
means of more efficient work and increased productivity, with no regard to the fact that care always
directs one’s attention towards a needful responsiveness in his/her behaviour and relationships and
implies dependencies in human life. Hence, coercion is explained as an instrument of social control
and domination, while care accounts for public order and social cohesion. Coercion functions
primarily in relationships of power, whereas mutual obligation under some form of social contract is
foundational to the concept of care.152 On the competing discourses of coercion and care, Sewell and
Barker propose an ironic perspective that stirs-up the discussion beyond this paradox153 and forces
145 Zureik, “Theorizing Surveillance: The Case of the Workplace,” 31. 146 Brian L. Zirkle, and William G. Staples, “Negotiating Workplace Surveillance,” in Electronic Monitoring
in the Workplace: Controversies and Solutions, ed. J. Weckert, 79-100 (Hershey: Idea Group Publishing,
2005), 80. 147 Eileen M. Otis and Zheng Zhao, “Producing Invisibility,” in Invisible Labour: Hidden Work in the
Contemporary World, eds. Marion Crain, Winifred R. Poster and Miriam A. Cherry, 148-169 (California:
University of California, 2016), 151. 148 Zureik, “Theorizing Surveillance: The Case of the Workplace,” 32. 149 Surveillance is coercive due to the mere fact that there is someone always observing. It can also, in an
organizational setting, include a positive act of coercion from the organizer/the employer. We, rather,
distinguish here the latter from the former to avoid the pseudo effect due to its Gnostic cliché- knowledge
saves, and mean a massive growth in surveilling the individual and groups even in indirect observation
without the determination and containment of particular spaces (Graham & Wood 2003). 150 Graham Sewell and James R. Barker, “Coercion versus Care: Using Irony to Make Sense of Organizational
Surveillance,” The Academy of Management Review 31, no. 4 (2006): 935. 151 Sewell and Barker. “Coercion versus Care,” 938-940. 152 Sewell and Barker. “Coercion versus Care,” 939. One of the more recent social contract theorists is John
Rawls whose revised idea of social contract goes in line with political liberalism and progresses with the
concepts of impartiality and fairness. John Rawls, A Theory of Justice (Cambridge, MA: Harvard University
Press, 1971, rev. ed. 1999). 153 In the context of workplace, the irony of surveillance and ‘resistance’ explores deep concern. Sewell and
Barker observe that in the workplace, “by participating in ‘resistance by negotiation,’ members are ironically
appropriating the discourse of care while also relying on the ability of a liberal conception of participation
and legal protection to identify and prevent egregious instances of coercion.” Sewell and Barker, “Coercion
versus Care,” 949. Hence, legitimate and enabling practices are embraced while rejecting repressive and
constraining ones. In a paradoxical situation, organizational members understand the meaning of surveillance
by negotiating the simultaneous truths of coercion and care and try to bring value-based judgements about
situational surveillance practices. Here the balance of rational and moral status of surveillance involves the
practice of the combination of coercion and care.
Power Distance and Social Sorting
166
us to see things from diverse perspectives, thus crumbling the undue domination of a single and
limited view.
In the context of the workplace, the ironic relationship between surveillance and ‘resistance’ is of
great concern. Sewell and Barker observe that, in the workplace, “by participating in ‘resistance by
negotiation,’ members are ironically appropriating the discourse of care while also relying on the
ability of a liberal conception of participation and legal protection to identify and prevent egregious
instances of coercion.”154 Hence, legitimate and enabling practices are embraced while repressive
and constraining ones are rejected. In a paradoxical situation, organizational members understand
the meaning of surveillance by negotiating the simultaneous truths of coercion and care and try to
form value-based judgements about situational surveillance practices. At this juncture, the balance
between the rational and moral status of surveillance can be secured by properly combining coercion
and care. It also involves the appreciation of the fallibility of one’s own conceptions and creatively
uses various formations to make sense of an ambiguous situation.
The dilemma unravelled here, however, is the polarized mentality that conceives of surveillance as
a legitimate system for caring for the interests of everyone, and also as a powerful instrument of
managerial coercion and employee subordination. Yet, as we perceive in both circumstances,
surveillance functions as a form of ‘disciplinary power.’ This has to be discussed further, as it
anticipates a deviation from the desired norms of the organization – with the more powerful
dominating the less powerful and thus completing the subjugation of employees.155 Here,
relationships of power dominate organizational members, making the work-life balance more
controlled and predictable. The predominance of hierarchy and rule-based conduct will be strongly
established in this context, , often to the advantage of the hierarchy itself. For example, from an
employee-centred perspective, the previously discussed panoptic metaphor of Jeremy Bentham, later
analysed and applied by Foucault, also shows the gravity of this power relationship in the context of
organizational surveillance. According to Foucault, “the major effect of the panopticon was to induce
in the inmate a state of conscious and permanent visibility that assures the automatic functioning of
power.”156 The employees as inmates in an organizational context have no choice but to act as if they
are being watched incessantly, even when they are not. Thus, we are forced to consider the
relationship between organizational surveillance and the exertion of power.
4.3.1 Surveillance Portrays Power Control
Power is an ability to act that often produces decisive effects in the act itself and results in control
over things and people. It is broadly defined as asymmetric control of valuable resources,157 and
therefore is inherently relational. For this reason, power always exists in relation to others. It also has
dominion over human relationships, influencing others through the predominance and supremacy of
an acting agent - an individual, group or organization. Foucault as an observer of human relations
examines the nature of power in society and states that power “reaches into the very grain of
individuals, touches their bodies and inserts itself into their actions and attitudes, their discourses,
learning processes and everyday lives.”158 Thus, for Foucault, knowledge is power and is fully
154 Sewell and Barker. “Coercion versus Care,” 949. 155 Positive implications of the concept ‘care’ in combination with the concept of transparency’ will be analysed
in the last part of this research. 156 Michel Foucault, Discipline and Punish: The Birth of the Prison (New York: Pantheon Books, 1977), 201. 157 Joe C. Magee and Adam D. Galinsky, “Social Hierarchy: The Self-Reinforcing Nature of Power and Status,”
The Academy of Management Annals 2, no. 1 (2008): 351-398. 158 Michel Foucault, Power/Knowledge: Selected Interviews and Other Writings, 1972-1977, trans. Colin
Gordon et al. (New York: Pantheon, 1980), 30.
Power Distance and Social Sorting
167
immersed in every human activity and relation. He also writes that “there is no power relation without
the correlative constitution of a field of knowledge, nor any knowledge that does not presuppose and
constitute at the same time, power relations.”159 Nevertheless, Foucault reviews the effects of power
and affirms that “it produces domains of objects and ritual of truth.”160 Clegg et al. also express that
“[...] power need not always be regarded as something to be avoided. Power can be a very positive
force; it can achieve great things.”161 Conversely, power, with its inherent capacity to influence and
control others, is also a resource to achieve certain goals with often vested interest in mind, and these
interests may be shared or contested.
However, power, according to Peter Fleming and Andre Spicer, is an endemic part of organizational
life, and we need today a careful and vigorous conceptualization and articulation of how
organizational power functions.162 Although in general power functions in positive way, within the
context of organizational surveillance it is important to discuss how employee lives and conduct can
be negatively affected by this power relation. For constant observation turns out to be a control
mechanism in an organization, and when few people control the knowledge acquired through
observation, oppression and subjugation of the observed is likely. Electronic and other data-based
surveillance in the organizational context also reveal of the few of the powerful possess control or
command over the many. In this regard, electronic surveillance may also be considered in terms of
the discretion of power. We would draw attention here to the taxonomy of Fleming and Spicer, who
identify four faces of power: coercion, manipulation, domination, and subjectification. This
taxonomy is helpful in understanding the nuances of electronic surveillance and power relations.163
Taking a sociological and ethical approach, we agree with Fleming and Spicer that these expressions
of power may be “episodic” (in the case of coercion and manipulation) or “systemic” (in the case of
domination and subjectification).164 For power both appears and occurs at different or irregular times,
as well as in a way that spreads throughout a system.
Electronic surveillance, as an exercise of coercive power, focuses on the direct implementation of
power to achieve certain desired ends. This becomes problematic when an individual or a group who
exercises such power goes beyond the legitimate authority vested in their position. This power, as a
result of the knowledge or data gathered through observation, may be used to secure certain
outcomes, and this may in turn produce a sense of powerlessness and low expectations among
employees. Surveillance itself seems again a process of domination, whereby the agents influence
the targets through a reconstruction of ideological values, which reshapes the preferences, attitudes
and outlooks of the targets. Finally, reflecting on subjectification, we articulate that surveillance in
an organization also seeks to determine an actor’s very sense of self, emotions and identity, and thus
normalizes a particular way of being in the organization. Power thus becomes an inescapable factor
in organizational surveillance, establishing more systemic power relations.
In organizations, employees are often the visible prey of surreptitious surveillance, and the practice
such surveillance itself becomes a tool for establishing and enforcing a hierarchical power
relationship, often under the pretext of securing certain management outcomes. The subtle
combination of coercion and care in the critical evaluation of surveillance can only be seen as a
continuation of the power relationship, even when it is analysed and scrutinized in terms of liberal
159 Foucault, Discipline and Punish, 27. 160 Foucault, Discipline and Punish, 194. 161 S. R. Clegg, D. Courpasson and N. Phillips, Power and Organization (London: Sage, 2006), 3. 162 Peter Fleming and Andre Spicer, “Power in Management and Organization Science,” The Academy of
Management Annals 8, no. 1 (2014): 238. 163 Fleming and Spicer, “Power in Management and Organization Science,” 237 – 298. 164 Fleming and Spicer, “Power in Management and Organization Science,” 240.
Power Distance and Social Sorting
168
and radical traditions, as explained above. Pragmatic arguments are often made to justify the use of
surveillance as coercive control and as care. This justification must be further discussed, however,
given the unresolved problems of curtailed freedom, power suppression, and constrained behavioural
patterns due to anxiety, fear and irrational stress that affect organizational and social culture. For this
reason, we need to revisit the surveillance debate. In what follows, we discuss the traditional
understanding of the normalizing effects of surveillance, then aim to move beyond this.
4.3.2 Beyond the Normalizing Effect: Discipline and Control after Foucault
Organizational surveillance is a powerful means of creating and re-inforcing long-term social
differences, as it “engages many kinds of power, and is both productive and, sometimes,
pernicious.”165 According to Clive Norris, “[a]t the heart of the panoptic project is the collection of
individualized codified information, and this provides the rationale for classification and subsequent
authoritative intervention.”166 In the same way, coercive power in surveillance, as noted, secures
greater power and privilege for the one doing the surveillance, and tends thereby to devalue and
discredit the target.167 Moreover, “the dominant groups determine how and in what interests the
material infrastructure operates,”168 and thus, as a form of power discharge through detailed
observation and examination, the subjects become objectified. As Foucault rightly observes in his
Discipline and Punish, the observed becomes “the object of information, never a subject in
communication.”169 This is a wonderful insight from Foucault, and our own argument here could be
read as an effort to draw out the implications of this.
Panopticism, discipline, and control are the three key themes in Foucault’s work that are still relevant
in surveillance studies, as these themes recur in any ethical analysis of surveillance.170 As we have
illustrated in the first chapter, Foucault provides a ‘disciplinary model’ and a ‘control model’
understanding of surveillance. Though Foucault’s emphasize is on discipline in general, surveillance
in a modern organizational context always involves a “power” mechanism over the life chances of
employees. In this regard, electronic surveillance might also concern the discretion of power.
Surveillance itself seems again a process of domination, whereby the agents influence the targets
through a reconstruction of ideological values as noted above. This is turn reshapes the preferences,
attitudes and outlooks of the targets. Power is the logic of this domination, and because of the
increased impact of this power as power distance, the relevance of this logic in the context of
surveillance debates is questionable. At this juncture, particularly interesting is that Lyon’s
understanding of surveillance goes beyond Foucault’s notion of a disciplinary society, where persons
are “normalized” by their categorical locations, and also goes beyond Gilles Deleuze’s “society of
control” argument.171
165 Lyon, “Facing the Future: Seeking Ethics for Everyday Surveillance,” 173. 166 Norris, “From Personal to Digital,” 251. 167 Bertram H. Raven, “The Basis of Power: Origins and Recent Developments,” Journal of Social Issues 49
(1993): 242. 168 David Lyon, “Everyday Surveillance: Personal Data and Social Classifications,” in The Surveillance Studies
Reader, eds. S. P. Hier and J. Greenberg, 136-146 (New York: McGraw-Hill. 2007a), 140. 169 Foucault. Discipline and Punish, 200. Foucault expressed the panopticon as “the epitome of social control
in modern times” and stimulated the association of panopticon and electronic surveillance. See, Lyon,
Surveillance Society: Monitoring Everyday Life, 115. 170 Maša Galič, Tjerk Timan and Bert-Jaap Koops, “Bentham, Deleuze and Beyond: An Overview of
Surveillance Theories from the Panopticon to Participation,” Philosophy & Technology 30, no. 1 (2017): 15-
18. 171 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 23. See, Gilles Deleuze,
“Postscript on the Societies of Control.” October 59 (1992): 3-7. This essay first appeared in L’Autre Journal
Power Distance and Social Sorting
169
Foucault explains how techniques developed for innocuous purposes create the system of
disciplinary power. The three primary techniques of control in any society, according to Foucault,
are hierarchical observation, normalizing judgment, and examination.172 Organizations function
mainly based on managerial rules and regulations, which maintain order and move the organization
towards its goals. However, surveillance as a managerial norm of a hierarchical observation also
creates a power culture in the organization. Normalization means discipline through the impositions
of precise norms, that is the judgement that an action is or is not allowed by the law.173 This
normalization means further, first, the awareness of being tracked, and then the encouragement to
accept it as an unconscious reality, without worrying much about it. The examination at the end is
the prime example of power that combines both hierarchical observation and normalizing
judgment.174 The ‘normalization judgement,’ for Foucault, is an action referring to a whole that
occurs through comparison, differentiation and following the principle of a rule. It could be defined
as invoking a standard, but often it is imposed by an outsider, not as a result of consensus. In this
regard, control over people attained through merely observing them hierarchically, and a culture of
power prominence through normalizing and examining, both diminish the genuineness of
employees’ sense of mutual obligation and social responsibility.
Reflecting on Foucault, Deleuze argues that a strategic shift in power relations is underway.175 Rather
than speaking of a ‘disciplinary society,’ Deleuze develops the notion of ‘societies of control’ that
focus on how modern surveillance tracks persons rather than imposing disciplines.176 According to
Deleuze, bodies resists the concentrated containment of military strategy and its regimentation
characteristic of disciplinary power, and thus a new form of control emerges in reaction to this. This
new mechanism of power fixes the body independently of its location. Thus, though power extends
its territory, its functional and informational parameters are controlled so much that soon we live in
circumscribed parameters.177 From this perspective, surveillance ultimately conceives a society of
control, which is well suited to the power relations of any organizational structure. At this point,
Lyon’s view is akin to Carol Gilligan’s ethics of care, proposing that “care should be highlighted as
a countervail against mere control.”178 Proposing a new conception of the person as a node in a
complex web of relations, which is more social than other, more traditional conceptions of the person,
he adds that “[...] if the social, embodied person is seen in a web of relationships in which, at best,
care is paramount, then this stance provides a truly critical ethical starting point for situating and
assessing surveillance.”179 Here we see a move from the sociology of surveillance to a new and strong
ethical starting point. This will serve as a guide for our critical analysis, as it always swings between
the notons of passive surveillance and the active body.
1 (1990). Here Lyon compares also Michel Foucault and William Bogard that “[f]or Foucault, discipline
normalizes people to moral standards of behaviour or to institutional requirements. For Bogard, in ‘telematic’
societies, individuals are ‘supernormalized’ according to codes, managed as flows of data.” Lyon,
Surveillance Society: Monitoring Everyday Life, 117. See, William Bogard, The Simulation of Surveillance:
Hyper-Control in Telematic Societies (Cambridge: Cambridge University Press, 1996), 3-50. 172 Foucault, Discipline and Punish, 170-194. 173 Foucault, Discipline and Punish, 170-183. 174 Foucault, Discipline and Punish, 184-194. 175 Deleuze, “Postscript on the Societies of Control.” 3-7. 176 Lyon, Surveillance Society: Monitoring Everyday Life, 35. Cf. Galič, Timan and Koops, “Bentham, Deleuze
and Beyond,” 19. 177 Deleuze, “Postscript on the Societies of Control.” 3-7. 178 Lyon, “Facing the Future: Seeking Ethics for Everyday Surveillance,” 180. 179 Lyon, “Facing the Future: Seeking Ethics for Everyday Surveillance,” 179.
Power Distance and Social Sorting
170
Priscilla Regan, however, challenges the notions of a “risk society,”180 highlighting the surveillance
and other monitoring and screening practices required to manage risk. For her, surveillance and
monitoring practices create an unquenchable thirst for more information about the risks that exist
generally, as well as the risks posed by particular individuals. The knowledge afforded by
surveillance systems does not result in a sense of security or trust, but rather produces new
uncertainties, leading to still more surveillance and the collection of still more information.181 Hence,
Regan argues that privacy is of value to society in general and should be recognized as a common
good, yet without compromising the priority given to it in relation to the individual. Surveillance in
an organization thus leads first to the categorization of people, assigning each individual or group a
certain worth or risk, and then to the subordination of real persons to abstracted data. Facing this
individual and social moral dilemma, we need a more concrete evaluative model that goes beyond
customary managerial laws and precepts. This model will be investigated in the last part of this
research. The next portion of this section will clarify the relation between technology-mediated
power control and the disempowering experience of workplace surveillance.
4.3.3 Technology Mediated Power Control and Disempowering Experience
It is hard to imagine any continuing social arrangements without some means of exercising social
control. However, certain forms of social control in modern life raise distinctive value issues, for
example a concern that “the collective consequences of their abuse are likely to be more
sweeping.”182 Individual experiences in certain situations make this form more oppressive and
destructive. It is true with the phenomenon of workplace surveillance: many find it really the easiest
modern method of generating and exerting control and power over labour, labour processes and
performance alike. The imposition and use of various deposits of monitoring technologies in the
workplace erodes employment relationships and contributes to the increased feeling of
powerlessness among employees. These systems, argue Peter Jeffrey Holland, Brian Cooper and Rob
Hecker, further “reinforce employer power by promoting the enforcement of employee obedience –
a panopticon approach.”183 Similarly, in line with social facilitation theory, Aiello and Svec contend
that just like the ‘physical presence’ of supervisory monitoring, the ‘electronic presence’ of
technology mediated monitoring also leads employees to perform a complex task more poorly than
180 The concept of a risk society in fact drives the interest in the actions and transactions of all individuals and
the increase in surveillance throughout society. Institutions that deal with individuals collect all their
information and structure their dealings with those individual accordingly. Ericson and Haggerty however
hold that the concept of a risk society operates within a negative logic focusing on fear. It also underpins the
value system of insecurity and unsafe society that again demands more knowledge of risk (Regan 2002).
Priscilla M. Regan, “Privacy as a Common Good in the Digital World,” Information, Communication and
Society 5, no. 3 (2002): 382-405. 181 Regan, “Privacy as a Common Good in the Digital World,” 382-405. 182 James B. Rule, “High-Tech Workplace Surveillance: What’s Really New?” in Computers, Surveillance,
and Privacy, eds. David Lyon and Elia Zureik, 66-76 (Minneapolis: University of Minnesota Press, 1996),
69. 183 Holland, Cooper and Hecker, “Electronic Monitoring and Surveillance in the Workplace,” 165.
Power Distance and Social Sorting
171
the unmonitored employees.184 The ‘social presence’ of the supervising authority,185 through
technology mediation, functions as an actual presence, and even more so given that the actuality of
this presence is never known. The remote technological presence functions in the same way as the
here-and-now actual physical presence.186
William G. Staples interprets the Foucauldian understanding of surveillance as “micro techniques of
discipline that target and treat the body as an object to be watched, assessed and manipulated.”187
For, like the panopticon, consistent electronic surveillance, which often makes it impossible to
recognize that one is being monitored, induces in the employees a state of conscious and permanent
visibility and thus enables the automatic functioning of power.188 For the purpose and major effect
of surveillance, according to Foucault, was to induce consciousness of “permanent visibility” and
thus achieve the “automatic functioning of power” in a given situation.189 So, when systems of
surveillance try to rationalize employee skill and knowledge of the labour process and other job
performance criteria, in order to assign these to management to ensure employees’ compliance and
replaceability.190 Automated judgements of social or economic worth, according to one’s surveilled
performance, causes social exclusion in the workplace and alienates workers.191 Analysing some case
studies in the literature, Elia Zureik argues that “surveillance in the workplace is clearly implemented
in order to disempower workers, exploit them, and reduce any appearance of management’s concern
for employee well-being to a disguise for continued employee discipline.”192 Along with this
disempowerment of workers, hard deterioration happens and surveillance technologies possess the
responsibility for making decisions about job performance.
Adding to this understanding, David Mason et al., quoting Graham Sewell and Barry Wilkinson,
opine that “despite apparently radical changes in the organization and management of work,
management retained, and continues to pursue through new means, its traditional interest in
challenging worker empowerment and autonomy.”193 A simple assumption here seems to be that
employment relationships have become manipulative and conflictual and that employees resist this
184 John R. Aiello and Carol M. Svec, “Computer Monitoring of Work Performance: Extending the Social
Facilitation Framework to Electronic Presence,” Journal of Applied Social Psychology 23, no.7 (1993): 537-
548. Same reference is also found in: Devashieesh P. Bhave, “The Invisible Eye? Electronic Performance
Monitoring and Employee Job Performance,” Personnel Psychology 67 (2014): 607. Social facilitation theory
states that the physical presence of the other causes an individual poor performance in complex tasks and
better performance in simple tasks. It is also called as the ‘audience effect’ as people tend to perform
differently when alone and when with others. Robert B. Zajonc, “Social Facilitation,” Science 149, no. 3681
(1965): 269-274. See also, Bernd Strauss, “Social Facilitation in Motor Tasks: A Review of Research and
Theory,” Psychology of Sport and Exercise 3, no. 3 (2002): 237-256. 185 Jeffrey M. Stanton and Amanda L. Julian, “The Impact of Electronic Monitoring on Quality and Quantity
of Performance,” Computers in Human Behaviour 18 (2002); 86. 186 Stanton and Julian, “The Impact of Electronic Monitoring on Quality and Quantity of Performance,” 88. 187 William G. Staples, The Culture of Surveillance: Discipline and Social Control in the United States (New
York: St. Martin’s Press, 1997), ix. See, Zureik, “Theorizing Surveillance: The Case of the Workplace,” 39. 188 Norris, “From Personal to Digital,” 249. Cf. Galič, Timan and Koops, “Bentham, Deleuze and Beyond,”
16. 189 Foucault, Discipline and Punish, 201. 190 Zirkle and Staples, “Negotiating Workplace Surveillance,” 80. 191 Stephen Graham and David Wood, “Digitizing Surveillance: Categorization, Space, Inequality,” in The
Surveillance Studies Reader, eds. Sean P. Hier and Josh Greenberg, 218-230 (Berkshire, England: McGraw-
Hill, 2007), 219. 192 Zureik, “Theorizing Surveillance: The Case of the Workplace,” 47. 193 David Mason et al., “On the Poverty of Apriorism: Technology, Surveillance in the Workplace and
Employee Responses,” Information, Communication & Society 5, no. 4 (2002): 560; Graham Sewell and
Barry Wilkinson, “Someone to Watch over Me”: Surveillance, Discipline and the Just-in-Time Labour
Process,” Sociology 26, no. 2 (1992): 271-289.
Power Distance and Social Sorting
172
with altered behavioural patterns. For instance, when workplace relations become negative in
character, this is reflected in workers’ efforts to take control of or accommodate organizational rules
and may bring only judicious responses to it.194 All these altered behaviours or responses are part of
workers’ resistance to the subduing effects of panoptic surveillance. It is still difficult to identify
instances of resistance and the criteria by which such would be judged, as it depends on specific
contexts and must be done on an individual basis. However, different ‘shortcuts’ are being used to
resist company policies when they become too intrusive. For, as David Mason et al. illustrate,
referring to Patricia K. Edwards’ work on employment and new ‘enterprise culture,’ “the term
'resistance' itself is endowed with a strategic ambiguity, one which enables it to sound as though it
captures a strong, determined and explicit rejection of managerial domination, while it is deployed
as an expression with a merely technical content, identifying merely those actions which happen - in
one way or another - to deviate from management expectations.”195 So, finally, Mason et al. recognize
the widespread tendency among employees to commit non-complaint acts of resistance, asserting
their power against management interests or requirements and thus seeking to protect their individual
privacy and autonomy.196
Carl Botan likewise discusses the effects of surveillance in the workplace. The more employees feel
surveilled, he states, the less they feel like receiving adequate feedback on job performance or even
communicating with fellow employees. Often, they develop the feeling of being isolated in the
clutches of the electronic panopticon,197 and thus sink into alienation. Worker alienation in a
surveillance context is “the lack of worker freedom and control, purpose and function, and self-
involvement in employees’ work” due to the unprecedented use of highly automated technologies.198
Workers’ alienation is illustrated as “a lack of worker freedom and control, purpose and function and
self-involvement in their job.”199 In the same way, one of the alienating experiences of workplace
monitoring is the possibility of having little or no peer social support, since individuals or groups are
often placed at separate stations in full view of monitoring gadgets and forced to remain in a place
where they can be “seen” all time.200 This feeling of isolation leads to stress and repetitive strain
injuries. This will be further explored in the next section.
Practices of surveillance also result in the commodification of labour and the accumulation of
interests. Accumulation of interest is a result of the commodified use of data or information. As
already discussed, strategies implemented to keep track of things often also keep track of
employees.201 Referring to E.P. Thompson’s seminal essay, “Time, Work-Discipline, and Industrial
Capitalism,” Lyon illustrates a labour commodification medium called ‘time-discipline’ that focuses
on “task-oriented” time over value- or “labour-oriented” time.202 Anytime surveillance in the
workplace tries to regularize labour and structure work habits, and thus commodify the subjective
dimension of labour. As Lyon quotes, “socially necessary labour time […] became the main
194 Mason et al., “On the Poverty of Apriorism,” 560. 195 Mason et al., “On the Poverty of Apriorism,” 561. See for instance, Patricia K. Edwards, “Patterns of conflict
and accommodation,” in Employment in Britain, ed. Duncan Gallie (Oxford: Blackwell, 1988), 187-217. 196 Mason et al., “On the Poverty of Apriorism,” 562. 197 Carl Botan, “Communication Work and Electronic Surveillance: A Model for Predicting Panoptic Effects,”
Communication Monographs 63, no.4 (1996): 294-313. 198 Kissa and Ssanyu, “Workplace Surveillance,” 13. 199 Hamed Al-Rjoub, Arwa Zabian and Sami Qawasmeh, “Electronic Monitoring: The Employees Point of
View,” Journal of Social Science 4, no. 3 (2008): 191. 200 Kissa and Ssanyu, “Workplace Surveillance,” 13; Otis and Zhao, “Producing Invisibility,” 151. 201 James Rule and Peter Brantley, “Computerized Surveillance in the Workplace: Forms and Distributions
Source,” Sociological Forum 7, no. 3 (1992): 416. 202 David Lyon and Elia Zureik, “Surveillance, Privacy, and the New Technology,” in Computers, Surveillance,
and Privacy, eds. David Lyon and Elia Zureik, 1-18 (Minneapolis: University of Minnesota Press, 1996), 9.
Power Distance and Social Sorting
173
ingredient in the conversion of labour to its corresponding exchange value […and] the
commodification of labour via its transformation into labour-power.”203 It creates in turn, to borrow
the critical reading of Karl Marx by Paul Warmington,204 a commodity-determined society and
functions to generate a commodity-determined social universe. Zureik explains the impacts of this
commodification further in our particular context, that “because of the commodification of labour as
a wilful, artful and living subject, complete systems of surveillance ignore the day-to-day encounter
between workers and management and the potential for resistance, thus leading management to
exercise control through employee consent.”205 This power also relates to the accumulation of
information and thus the supervision of subordinates. It leads to questions about the sanitizing role
of surveillance in shaping the organizational and social behaviour of employees. This same question
is addressed in the succeeding section.
4.4 BEHAVIOURAL EFFECTS OF EMPLOYEE SORTING AND CONTROL
Because surveillance increases management power control, as discussed above, it also produces or
directs employee behaviour. For instance, analysing a notion of ‘surveillance capitalism’206 as it
“involves real-time monitoring of contractual performance along with real-time, technology-enabled
enforcement of the contract,”207 Galič, Timan and Koops, quoting Shoshana Zuboff, state that:
In a world where such a system of contractual monitoring and enforcement is the norm, ‘habitats
inside and outside the human body are saturated with data and produce radically distributed
opportunities for observation, interpretation, communication, influence, prediction and ultimately
modification of the totality of action,’ establishing a new architecture from which there is no
escape, making the Panopticon seem prosaic. Where power was previously identified with
ownership of means of production, it is now constituted by ownership of means of behavioural
modification.208
Employee behaviour is modified or rather often manipulated and is “subjugated to commodification
and monetisation”209 in line with present day market dynamics.
Michael J. Smith and Benjamin C. Amick III maintain that the general ‘paranoia’ induced by
electronic monitoring is “the backbone of an impersonalized workplace in which every ‘sneeze’ or
203 Lyon and Zureik, “Surveillance, Privacy, and the New Technology,” 10. 204 Paul Warmington, “From ‘Activity’ to ‘Labour’: Commodification, Labour Power and Contradiction in
Engeström’s Activity Theory.” Outlines. Critical Practice Studies 10, no. 2 (2008): 5. 205 Zureik, “Theorizing Surveillance: The Case of the Workplace,” 48. 206 The notion of surveillance capitalism is derived from conceptualising surveillance as a dominant feature of
captial society. It is first used by John Bellamy Foster and Robert W. McChesney and developed by Shoshana
Zuboff. Surveillance capitalism is said to be “a new subspecies of (information) capitalism [...] in which
profits derive from the unilateral surveillance and modification of human behaviour.” Galič, Timan and
Koops, “Bentham, Deleuze and Beyond,” 24. Cf. Shoshana Zuboff, “The Secrets of Surveillance Capitalism,”
Frankfurter Allgemeine, Feuilleton, (2016). http://www.faz.net/aktuell/feuilleton/debatten/the-digital-
debate/shoshana-zuboff-secrets-of-surveillancecapitalism-14103616.html [accessed October 20, 2018];
Shoshana Zuboff, “Big Other: Surveillance Capitalism and the Prospects of an Information Civilization,”
Journal of Information Technology 30 (2015): 75-89; John Bellamy Foster and Robert W. McChesney,
“Surveillance Capitalism: Monopoly-Finance Capital, the Military-Industrial Complex, and the Digital Age,”
Monthly Review 66, no. 3 (2014): 1-31. 207 Galič, Timan and Koops, “Bentham, Deleuze and Beyond,” 25. 208 Galič, Timan and Koops, “Bentham, Deleuze and Beyond,” 25. Cf. Shoshana Zuboff, “Big Other:
Surveillance Capitalism and the Prospects of an Information Civilization,” Journal of Information
Technology 30 (2015): 82. 209 Galič, Timan and Koops, “Bentham, Deleuze and Beyond,” 25. Cf. Zuboff, “Big Other: Surveillance
Capitalism and the Prospects of an Information Civilization,” 85.
Power Distance and Social Sorting
174
every ‘breath’ of a worker will be recorded and analysed; and more importantly will be used in some
way to punish workers, or to change their behaviour in an unsatisfactory way.”210 The loss of control
on a basic ‘instrumental’ level, for example through restrictions on employee opportunities to use
available tools to change the environment or product, can affect employees’ perception of control
and diminish their self-esteem by limiting their freedom to use their skill and decisional authority.211
A major concern here is the influence of electronic monitoring and instrumental control on worker
self-image and on feelings of self-worth. Just above the instrumental level of control is an individual
employee’s ‘discretionary latitude’ concerning how various tasks and work are to be scheduled and
carried out.212 Workplaces with extensive electronic monitoring most often give employees low
decision latitude and high job demands, which of course carries with it an increased risk of job
dissatisfaction and employee exhaustion and depression.
One major focus of workplace surveillance is the work related feelings of employees, including
attitudes and emotions, belief systems and inherited norms. All of these in turn modify employees’
productive/unproductive and citizenship behaviour.213 J.M. Stanton and E.M. Weiss refer in this
context to the declension of prosocial or extra-role behaviour.214 By analysing Social Information
Processing (SIP) theory, they predict on-the-job behavioural change.215 Stanton and Weiss observe
that “SIP predicts that normative social cues that workers receive from a variety of sources in the
workplace will influence their attitudes and behaviors,” and that often shapes their behavior “by
drawing attention to what was valued and rewarded in the organization and draw “attention away
from those activities that are shunned or proscribed.”216 Referring to Robert Beno Cialdini’s
suggestions concerning social influence and organizational dishonesty, David Zweig writes that
employees attribute their special monitored behavioural pattern not to their desire for effective
performance but to monitoring itself.217 Here the chance that employees will engage in an undesired
behavior may actually increase, just as soon as the employee can get away form the surveillance
gaze.
Employee resistance to invasive surveillance in this regard leads to a different stance in their
behaviour. According to the study of Peter Bain and Phil Taylor, it leads employees “to search for
and exploit gaps in the monitoring system”218 and try to take advantages of various opportunities.
Moreover, it generally leads to undesirable employee responses and behaviours, such as frequent and
210 Michael J. Smith and Benjamin C. Amick III, “Electronic Monitoring at the Workplace: Implications for
Employee Control and Job Stress,” in Job Control and Worker Health, eds. Steven L. Sauter, Joseph J. Hurrel
jr. and Cary L. Cooper, 275-289 (Chichester, New York: Wiley, 1989), 277. 211 Smith and Amick III, “Electronic Monitoring at the Workplace: Implications for Employee Control and Job
Stress,” 278. 212 Smith and Amick III, “Electronic Monitoring at the Workplace: Implications for Employee Control and Job
Stress,” 278. 213 J.M. Stanton and E.M. Weiss, “Electronic Monitoring in Their Own Words: An Exploratory Study of
Employees’ Experience with New Types of Surveillance,” Computers in Human Behaviour 16 (2000): 424. 214 Along with the decrease in productive behaviours, it is researched that, employee prosocial or extra-role
behaviours drastically decline when intensive or sever monitoring is performed. Stanton and Weiss,
“Electronic Monitoring in Their Own Words,” 424. 215 Stanton and Weiss, “Electronic Monitoring in Their Own Words,” 425. 216 Stanton and Weiss, “Electronic Monitoring in Their Own Words,” 425. 217 David Zweig, “Beyond Privacy and Fairness Concerns: Examining Psychological Boundary Violations as
a Consequence of Electronic Performance Monitoring,” in Electronic Monitoring in the Workplace, ed., John
Weckert, 101-122 (Hershey: Idea Group Publishing, 2005), 112. 218 Zweig, “Beyond Privacy and Fairness Concerns,” 113. Peter Bain and Phil Taylor researched extensively
about the employee resistance in the workplace in special reference to call centres. Peter Bain and Phil Taylor,
“Entrapped by the ‘Electronic Panopticon’? Worker Resistance in the Call Centre,” New Technology, Work
and Employment 15, no. 1 (2000): 216.
Power Distance and Social Sorting
175
unexpected withdrawal, irritating interruption and deliberate sabotage, and diminished citizenship.
Employees, in this respect, also become resistant to taking the risk associated with executing an
activity in a different way or undertaking an activity that requires more time than standard ones.
Employees here adjust or rather manipulate their acts and behaviours to accord with the expectations
of the one who monitors. Thus, both electronic systems of surveillance, through their own self-
monitoring and discipline, and the attitudinal canvases of employees themselves can and do control
and reshape their behaviour. In what follows, we discuss the resulting behavioural effects of
employee sorting and control.
4.4.1 Unsettled Stress, Emerging Distrust and Deviances
An very significant effect of monitoring and resultant employee sorting and control concerns the
psychological functioning of employees, including the production of fear, anxiety, hatred, loss of
self-image and both physical and mental stress.219 According to Sonny S. Ariss, “some have linked
anxiety, depression, and nervous disorders to the stress induced by workplace monitoring. Those
who are monitored may be ‘constantly apprehensive and inhibited’ due to the constant presence of
an ‘unseen audience.’ Some employees have even compared electronic monitoring to “working as a
slave and being whipped, not in our bodies but in our minds.”220 This leads to commitment problems
in the workplace and increases, along with the risk of serious health hazards, undesired behaviours
such as absenteeism, turnover, burn out and lowered productivity.221 Likewise, electronic monitoring
and the resultant creation of ‘electronic sweatshops’ further leads to unintended stress and social
isolation and as well as negative behavioural changes. Evolving the notion of a ‘panopticon’ – the
‘all-seeing place’ – of traditional discussion, the concept of ‘omnipticon’ by Rosen Jeffrey has
become today a pointer representing the surveillance of all people, everywhere, at all time222 that
creates an ‘electronic sweatshop’ in the workplace.223 Michel Foucault’s notion of a ‘panopticon’ –
the few watching the many - can be contrasted with Thomas Mathiesen’s ‘synopticon’ – the many
watching the few – and now in this age of internet also by Jeffrey Rosen’s ‘omnipticon’ – the many
watching the many. The realities designated by these terms are increasingly crucial today, as “no
one knows precisely who is watching or being watched at any given time.”224 This is indeed a stress
generating situation in the workplace.
219 Samantha Lee and Brian H. Kleiner, “Electronic surveillance in the workplace,” Management Research
News 26, nos. 2/3/4 (2003): 72-81. The increased electronic monitoring and resulting close supervision and
unrelenting control are certainly associated with high mental stress and leads to further burnouts and become
a drive to job-dissatisfaction. See for instance, Bradley J. Alge and S. Duane Hansen, “Workplace Monitoring
and Surveillance Since “1984”: A Review and Agenda,” in The Psychology of Workplace Technology, eds.
M.D. Coovert and L. Foster Thompson (New-York and London: Routledge, 2014), 209-237. Gomes-Mejia
et al. illustrate how well the electronic surveillance poses serious challenges on employees leading to stress
and dehumanizing effects. Luis R. Gomez-Mejia, David B. Balkin and Robert L. Cardy, Managing Human
Resources, 4th ed. (Harlow, UK: Pearson Education, 2004), 11-62. 220 Sonny S. Ariss, “Computer Monitoring: Benefits and Pitfalls Fasing Management,” Information &
Management 39 (2002): 556; N. Ben Fairweather, “Surveillance in employment: the case of teleworking,”
Journal of Business Ethics 22, no. 1 (1999): 39-49. 221 Smith and Amick III, “Electronic Monitoring at the Workplace: Implications for Employee Control and Job
Stress,” 277. David Zweig expresses the same idea of negative effects on employee stress, satisfaction, and
resulting turnover. Zweig, “Beyond Privacy and Fairness Concerns,” 105. 222 Rosen Jeffrey, The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age (New York:
Random House Trade Paperbacks, (2005), 11. 223 Kathy Eivazi, “Computer Use Monitoring and Privacy at Work,” Computer Law & Security Review 27
(2011): 517. 224 Jeffrey, The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age, 11; Thomas Mathiesen,
“The Viewer Society: Michel Foucault’s ‘Panopticon’ Revisited,” Theoretical Criminology 1, no. 2 (1997):
215-234.
Power Distance and Social Sorting
176
Several researchers, after comparing monitored employees with non-monitored employees in both
laboratory and field studies, reported that the monitored employees, unlike the nonmonitored,
experienced higher levels of stress, job dissatisfaction, depression, anger and fatigue.225 M.J. Smith
et al. in their study on worker’s stress illustrate that “the monitored employees reported higher
workload, less workload variation and great workload dissatisfaction than the unmonitored
employees the monitored employees also reported less control over their jobs […] less fairness of
their work standards and more frequent interaction with difficult customers.”226 Researchers like
Mahmoud Moussa identify both positive and negative features of stress in human life.227 Referring
to R.W. Griffin’s description of the consequences of stress, Mahamoud Moussa writes that the
“employee level of satisfaction, motivation, commitment, loyalty, and integrity in the workplace can
be affected as a result of extreme levels of stress”228 and leads to tension and pressure among
employees. Moussa, quoting Schermerhorn, further explains that,
[s]tress is comprised of two types: (a) “constructive stress,” and sometimes called “eustress,” is
personally energizing and performance-enhancing, urges greater endeavours, inspires creativity,
and enhances commitment, while still not devastating the individual or causing undesirable
consequences, and (b) “destructive stress,” which arises when there is a severe stress that may
affect an individual’s physical and mental systems and lead to job burnout or aggressive behaviour
toward others in the workplace.229
This stress leads, as discussed in the previous chapters, to psychological complaints (emotional
disorders) and physical complaints (health hazards). These effects are even accentuated by various
studies, which highlights that electronic monitoring is a major cause of psychological and physical
complaints among workers and that “monitoring makes us feel like prisoners hooked up to a
computer; mistreated, guilty, paranoid, enslaved, violated, angry, and driven at a relentless pace.”230
To further understand this stressful condition, M. J. Smith et al. point to what they call as “bathroom
break harassment,” where “workers’ stress becomes unbearable because employees fail to take
needed bathroom breaks out of fear of termination.”231 Stress is high and severe indeed when such
225 J. R. Aiello and K.J. Kolb, “Electronic Performance Monitoring and Social Context: Impact on Productivity
and Stress,” Journal of Applied Psychology 80 (1995): 339–353; R. David and R. Henderson, “Electronic
Performance Monitoring: A Laboratory Investigation of the Influence of Monitoring and Difficulty on Task
Performance, Mood State, and Self-Reported Stress Levels,” Journal of Applied Social Psychology 30,
(2000): 906–920; M. J. Smith, P. Carayon, K. J. Sanders, S. Y. Lim, and D. LeGrande, “Employee Stress
and Health Complaints in Jobs With and Without Monitoring,” Applied Ergonomics 23 (1992): 17–27; David
Holman, Claire Chissick and Peter Totterdell, “The Effects of Performance Monitoring on Emotional Labour
and Well-Being in Call Centers,” Motivation and Emotions 26, no. 1 (2002): 60. 226 M.J. Smith, P. Carayon, K.J. Sanders, S-Y. Lim, and D. LeGrande, “Employee Stress and Health Complaints
in Jobs with and Without Electronic performance monitoring,” Applied Ergonomics 23, no.1 (1992): 21. For
the same reference, see: Jitendra M. Mishra and Suzanne M. Crampton, “Employee Monitoring: Privacy in
the Workplace?” S.A.M. Advanced Management Journal 63, no. 3 (1998): 8. 227 Mahmoud Moussa, “Monitoring Employee Behaviour Through the Use of Technology and Issues of
Employee Privacy in America,” SAGE Open 5, no. 2 (2015): 1-13. Some kind of stress is recommended for
organizations that value a healthier atmosphere as it increases employee energy. DeCenzo, David A. and
Stephen P. Robbins, Fundamentals of Human Resource Management, 8th ed. New Delhi, India: John Wiley,
2005. 228 Moussa, “Monitoring Employee Behaviour Through the Use of Technology and Issues of Employee Privacy
in America,” 7. 229 J. R. Schermerhorn Jr. Introduction to management, 11th ed. (Hoboken, NJ: John Wiley, 2011); Moussa,
“Monitoring Employee Behaviour Through the Use of Technology and Issues of Employee Privacy in
America,” 7. 230 Richard L. Worsnop, “Privacy in the Workplace,” CQ Researcher 3, no. 43 (1993): 1025. 231 Mishra and Crampton, “Employee Monitoring: Privacy in the Workplace?” 8. See also, Kristen Bell
DeTienne, “Big Brother or Friendly Coach? Computer Monitoring in the 21st Century,” The Futurist 27, no.
Power Distance and Social Sorting
177
basic needs are restricted and when employees are deprived of even the most elementary amenities
of human life. Here also there can be a psychological reaction to complete monitoring, a motivational
reaction to persons or systems, when employees feel restrictions or regulations that curtail, threaten
or even eliminate their personal autonomy or desired behavioural patterns.232 Employees thus adopt
and adapt to certain behaviours that are contrary to those intended or expected. As it occurs in
response to threats of behavioural freedom, this also leads to social isolation in the workplace and
subjective behavioural changes.
Another theme that we need to emphasize here, apart from growing stress, is trust and mistrust. As
the term surveillance is also equated with “supervision, close observation, and invigilation of
individuals who are not trusted to work or go about unwatched,”233 the element of trust and mistrust
are prominent in this definition. Carolyn W. Baarda writes that “close monitoring of work is an
employment practice based on mistrust and lack of respect for basic human dignity.”234 Several
studies have identified that trust between employees and management is reduced when extensive
surveillance is put in place and quantity is preferred to quality.235 Employees typically interpret
increased surveillance as a sign of managerial distrust, which adversely affects their relationship with
managers and a lack of trust.236 There emerges a new behavioural pattern, as Zuboff calls it, an
“anticipatory conformity” to the surveillance systems as full cooperation in order to avoid or reduce
the risk of “unwanted discovery,” and this often diminishes trust and confidence both among workers
and between workers and management.237 It also, in course of time, creates a hostile work
environment.238 This shows that control systems like electronic monitoring communicate distrust to
employees, which often leads to retaliation and deviance.
For instance, the feeling of stringent role obligation defaulted on employees by employers
encourages them to engage in “reciprocal deviance,” which in turn affects their performance in the
workplace.239 This deviance, according to Sandra L. Robinson and Rebecca J. Bennet, can also be
called ‘production deviance,’ as it exhibits counterproductive behaviours, such as intentionally
5 (1993): 35-36. Cf. Kaupins and Coco, “Perceptions of Internet-of-Things Surveillance by Human Resource
Managers,” 54. 232 The theory of psychological reactance is developed by Jack William Brehm and is defined as “an aversive
reaction in response to regulations or impositions that impinge on freedom and autonomy.” Sharon S. Brehm
and Jack W. Brehm, Psychological Reactance: A Theory of Freedom and Control (San Diego, CA: Academic
Press, 1981), 1-6; Jack W. Brehm, A theory of psychological reactance (New York: Academic Press, 1966);
Jack W. Brehm, “Psychological Reactance: Theory and Applications,” in NA - Advances in Consumer
Research 16, eds., Thomas K. Srull and Provo, UT (Association for Consumer Research, 1989): 72-75. 233 Zureik, “Theorizing Surveillance: The Case of the Workplace,” 37. 234 Carolyn W. Baarda, Computerized Performance Monitoring: Implications for Employers, Employees and
Human Resource Management (Kingston, ON: IRC Queen’s University, 1994, 17. 235 Botan and Vorvoreanu, “What Do Employees Think about Electronic Surveillance at Work?” 130; Yerby,
“Legal and ethical Issues of Employee Monitoring,” 47; Effy Oz, Richard Glass and Robert Behling,
“Electronic Workplace Monitoring: What Employees Think,” OMEGA, The International Journal of
Management Science 27 (1999): 168. 236 Peter Jeffrey Holland, Brian Cooper and Rob Hecker, “Electronic Monitoring and Surveillance in the
Workplace: The Effects on Trust in Management, and the Moderating Role of Occupational Type,” Personnel
Review 44, no. 1 (2015): 162. 237 Shoshana Zuboff, In the Age of the Smart machine: The Future of Work and Power (New York: Basic,1988),
345; Susan Bryant, “Electronic Surveillance in the Workplace,” Canadian Journal of Communication 20, no.
4 (1995): 505-521. 238 Hamed Al-Rjoub, Arwa Zabian and Sami Qawasmeh, “Electronic Monitoring: The Employees Point of
View,” Journal of Social Science 4, no. 3 (2008): 191. 239 Zweig, “Beyond Privacy and Fairness Concerns,” 112.
Power Distance and Social Sorting
178
working more slowly or taking excessive breaks.240 For example, ‘employee-shirking’ behaviours –
not working as hard as expected or as called for – are notably increasing patterns of behaviours
observed in the organizational workplace by higher forms of electronic surveillance.241 This also
fosters an ‘opportunistic-act’ behaviour among employees, such that neither unrewarded actions nor
helpful behaviour are exhibited.242 Likewise, employees engage in impression management to
influence, often manipulatively, evaluations and supervisory assessments.243 Impression
management is defined as a process where “people attempt to influence the image others have of
them.”244 It is now a common phenomenon in the workplace and affects any areas, including
performance appraisal, information/feedback seeking, etc.245 It is driven, in such cases, by the prime
human motivationto be viewed in a favourable or conducive manner, avoiding the negative opinion
of others.246 Such behaviours, in turn, may lead employers to suspect the authenticity of the conveyed
impression. Hence, employees often exploit opportunities to increase their own welfare by enhancing
their own self-interest.
The intentional reduction of work effort is another common response of employees to monitoring.247
A study by Armin Falk and Michael Kosfeld on the consequences of control on employee motivation
reveals that tighter monitoring and control of employees entails various hidden costs in response,
including a deliberate performance drop.248 According to their study, employees consider “the
controlling decision as a signal of distrust and a limitation of their choice autonomy,”249 and thus as
counterproductive in many instances. However, workplaces with a climate of higher levels of
expressed trust exhibit higher responsibility norms and less deviance.250 That means that the higher
the trust climate, the less deviance occurs. When electronic monitoring is implemented in response
to any deviant behaviour, organizations only strike the symptoms, forgetting to root out the basic
cause of these behaviours thus triggering feelings of distrust. Zweig write that “decreased trust,
coupled with an electronic monitoring system that violates boundaries and triggers privacy and
fairness concerns, might lead to a decrease in organizational commitment.”251 Several researchers,
such as Sonny S. Ariss, express that employees’ strong feeling of being disresepected and distrusted
240 Sandra L. Robinson and Rebecca J. Bennett, “A Typology of Deviant Workplace Behaviours: A
Multidimensional Scaling Study,” The Academy of Management Journal 38, no. 2 (1995): 555-572; Bhave,
“The Invisible Eye? Electronic Performance Monitoring and Employee Job Performance,” 611. 241 Bhave, “The Invisible Eye? Electronic Performance Monitoring and Employee Job Performance,” 611. 242 Bhave, “The Invisible Eye? Electronic Performance Monitoring and Employee Job Performance,” 612. 243 Bhave, “The Invisible Eye? Electronic Performance Monitoring and Employee Job Performance,” 613. 244 Mark C. Bolino, “Citizenship and Impression Management: Good Soldiers or Good Actors?” The Academy
of Management Review 24, no. 1 (1999): 84. 245 Bolino, “Citizenship and Impression Management,” 84. Referring to Jones and Pittman, five categories of
impression management tactics are indicated: “(1) ingratiation, where individuals seek to be viewed as
likable; (2) exemplification, in which people seek to be viewed as dedicated; (3) intimidation, where
individuals seek to appear dangerous or threatening; (4) self-promotion, in which individuals hope to be seen
as competent; and (5) supplication, where people seek to be viewed as needy or in need of assistance.” Bolino,
“Citizenship and Impression Management,” 84-85. See for instance, Edward E. Jones and Thane S. Pittman,
“Toward a General Theory of Strategic Self-Presentation,” in Psychological Perspectives on the Self, vol.1,
ed., Jerry Suis (Hillsdale, NJ: Lawrence Erlbaum Associates, 1982), 231-262. 246 Bolino, “Citizenship and Impression Management,” 85.
247 Bruno S. Frey, “Does Monitoring Increase Work Effort? The Rivalry with Trust and Loyalty,” Economic
Inquiry 31, no. 4 (1993): 663. 248 Armin Falk and Michael Kosfeld, “The Hidden Costs of Control,” The American Economic Review 96, no.
5 (2006): 1611-1630. 249 Falk and Kosfeld, “The Hidden Costs of Control,” 1611. 250 Zweig, “Beyond Privacy and Fairness Concerns,” 113. 251 Zweig, “Beyond Privacy and Fairness Concerns,” 113.
Power Distance and Social Sorting
179
leads to decreased performance252 and deviant behaviours as well as low morale. All these, finally,
lead to more absenteeism253 and a high level of employee turnover. How surveillance and resultant
denial of self-respect lead to such a loss of self-determination and self-identity is further explored
here below.
4.4.2 The Loss of Self-Determination and Self-Identity
The panoptic effects of surveillance are generally perceived, according to Botan and Vorvoreanu, to
be both internal and behavioural.254 The effects become internal when the contrast between visibility
and invisibility creates internal vulnerability in workplace performance and processes, then has
behavioural effects as employees behave differently in response to that vulnerability. An altered
social relationship thus result from both the relative isolation imposed by surveillance and
employees’ felt need to maintain their privacy, individuality, and dignity as human persons.255
Previously discussed effects of surveillance, in the form of a reduced sense of privacy, reduced self-
esteem, increased uncertainty, reduced workplace communication and commitments, etc., all in fuel
a sense among employees that their self-determination has been lost. Due to the visibility-invisibility
contrast,256 where employees feel the continuing presence of surveillance whether or not it is being
done, propagates itself and leads to a sense of materialistic determinism. As discussed, surveillance
thus directly implies distrust and attacks the self-esteem of employees, implicitly suggesting that
“they are bad enough, or lazy enough, to make surveillance necessary.”257 It is a kind of meta-
communication that creates a distrusting scenario in the workplace.
This also has another negative psychological effect, in that the intrinsic motivation of employees
distressingly decreases and their identity assessment and sense of self-determination are impaired.
This situation worsens when employees feel that, on the one hand, that their involvement and
competence are not thought to be enough, and on the other hand, that their choice autonomy is limited
by external forces and that they are being forced to act only in a certain specified manner.258 This
shows that self-determination involves the characteristics of both internal and external motivations,
and the distinction between the two – the former being autonomous, the latter controlled – contributes
heavily to it. Maryléne Gagné and Edward L. Deci write, in this respect, that “autonomy involves
acting with a sense of volition and having the experience of choice […] in contrast, being controlled
involves acting with a sense of pressure, a sense of having to engage in the actions.”259 Here, over
against integrated self-regulation, we find, as Gagné and Deci put it, a kind of introjected regulation
that aims to exercise full control over persons.260 So, in a work-context, when employee behaviour
is controlled and restricted through external electronic monitoring, the capacity of self-determination
is lost and there arises, instead, only materialistic determination, which is more technological and
with a kind of ‘other-determination.’ Ultimately, this causes undesired behavioural regulations in the
workplace.
252 Sonny S. Ariss, “Computer Monitoring: Benefits and Pitfalls Fasing Management,” Information &
Management 39 (2002): 557. 253 Al-Rjoub, Zabian and Qawasmeh, “Electronic Monitoring: The Employees Point of View,” 191. 254 Botan and Vorvoreanu, “What De Employees Think about Electronic Surveillance at Work?” 133. 255 Botan and Vorvoreanu, “What De Employees Think about Electronic Surveillance at Work?” 133. 256 Carl Botan, “Communication Work and Electronic Surveillance: A Model for Predicting Panoptic Effects,”
Communication Monographs 63, no. 4 (1996): 298. 257 Botan, “Communication Work and Electronic Surveillance,” 302. 258 Maryléne Gagné and Edward L. Deci, “Self-Determination Theory and Work Motivation,” Journal of
Organizational Behaviour 26, no. 4 (2005): 331-362. 259 Gagné and Deci, “Self-Determination Theory and Work Motivation,” 333-334. 260 Gagné and Deci, “Self-Determination Theory and Work Motivation,” 334-335.
Power Distance and Social Sorting
180
Lyon speaks also about a socio-ethical disjuncture over the identity of the surveilled subjects. For
him, there seems to emerge a separation between two identities of the subject: a categorical profile
identity, and the subject’s ‘self-identity.’ The former of these, “the data image or digital persona that
circulates within risk assessment and other cognate surveillance communications,” Lyon writes, “is
increasingly distanced from the person from whom the data was initially obtained.”261 This
distinction produces low self-esteem and negatively wired individuality among employees, as they
are being looked down at and treated as mere identity profiles. Employees at this juncture emerge as
‘virtual robots,’ behaving only at the will and whim of employers, diminishing their self-respect and
sense of identity.262 Further, employees with this type of low self-identity also exhibit ‘anticipatory
conformity,’ behaving in passive, submissive or tolerant way in order to be accepted in work-related
situations. They often display a very minimal level of motivation and commitment.263 Thus,
employees’ controlled orientation and this kind of non-autonomous work climate that reduces self-
determinism have pervasively negative effects on employee behaviour, and thus negative work
outcomes. By contrast, maximizing employees’ opportunities to self-determinism and thus to take
initiatives leads to positive work outcomes.
One of the other key problems identified in relation to self is that when employees have internalised
the imperative to perform in any condition in the workplace, a subjectification process happens where
they become “observing entrepreneurial subjects and observed, objectified labouring bodies.”264
Moore and Robinson further explaine that the “[p]sychological changes arising from precarity
contribute to the formation of anxious selves who have internalised the imperative to perform a two-
part subjectification of workers as observing entrepreneurial subjects and observed, objectified
labouring bodies.”265 These issues are crucial mostly because the transcendence of the person makes
him or her unique relative to all other individuals. Persons cannot be understood as automated
machines or a mere “work force.” More than a member of a work force, an individual is unique
because he or she has more than the mere minimum status of an object. Individuals cannot be replaced
by any power system, since persons are beyond all systems of power and force. Therefore, any
devaluation of the value of a person does violence to his or her transcendence and uniqueness. This
will be discussed in detail in the concluding chapter. Finally, the above-mentioned negative work
outcomes also include depersonalization and even emotional exhaustion and collapse, which has the
further detrimental effect of curtailing extra-role behaviours in the workplace, leading employees to
do only what is minimally required. In what follows, we discuss this curtailment of extra-role
behaviours.
4.4.3 Effects on Social Process: The Curtailment of Extra-Role Behaviours
Most agree that environmental interaction plays a role in the process of social learning or behaviours,
and this introduces social process theories, such as social learning theory, into our discussion.
Learning is always a cognitive process in a social context that happens by observation, imitation and
modelling of behaviours and attitudes, then a reinforcement of the same (by means of reward or
punishment).266 Thus, there are both internal and external processes in learning and developing
261 Lyon, “Facing the future: Seeking ethics for everyday surveillance,” 173. 262 Jane Ragoo and Reeaz Chuttoo, “The Negative Effects of CCTV Workplace Surveillance,” Le Mauricien,
April 24, 2015. http://www.lemauricien.com/article/negative-effects-cctv-workplace-surveillance [accessed
March 15, 2017]. 263 Ball, “Workplace Surveillance: An Overview,” 93. 264 Moore and Robinson, “The Quantified Self: What Counts in the Neoliberal Workplace,” 2776. 265 Moore and Robinson, “The Quantified Self: What Counts in the Neoliberal Workplace,” 2776. 266 Any human behaviour, according to social learning theory, is developed in a reciprocal process of
continuous interaction and influence of cognition, behaviour and environment. Albert Bandura and Richard
H. Walters, Social Learning and Personality Development (New York: Holt, Rinehart, and Winston, 1963);
Power Distance and Social Sorting
181
behavioural patterns. To secure a fuller understanding of monitoring effects on employees, in
addition to the societal implications of social sorting, categorical suspicion, power control,
surveillance creep, etc., we need to consider its effects on social process. For, as our previous
discussions show, from the perspective of those who are the subjects of monitoring, “a more sinister
facet of choice, power and empowerment arises”267 and bring adverse effects of social processes.
This means that any monitoring, now trying to be embedded in workplace cultures, alters working
conditions, often by way of unwanted policing and creating another undesired social order.268 This
leads to social exclusion as employment opportunities are stratified due to the biased rules of thumb,
and if “left unchecked, such biases may develop into the exclusion of particular groups of candidates
from recruitment processes through the use of particular keywords, and hence leaves the organization
open to discrimination claims.”269 Therefore, monitoring does have adversarial effects on employee
behaviours in given social situations.
Surveillance in the workplace is not an equal-opportunity endeavour, as its internal and external
effects are not equally distributed. Nevertheless, we know that management practices of
“acknowledging others’ perspectives, providing meaningful rationales, and minimizing controls
[are] autonomy supportive”270 and redirect employee behaviours. Individual-centred behaviour is
fostered when an employee is monitored on an individual basis, and this discourages any employee
from working on a team basis to achieve organizational goals. This in turn, according to Mishra and
Crampton, destroys community-spirit among workers.271 According to Ball, “where monitoring was
less emphasized, there was relatively more opportunity for personal development, challenge, self-
pacing and promotion.”272 This phenomenon, indeed, promotes constructive relationships among
employees themselves, disregarding a mere rule-based compliance to build the same. In addition to
this, more recurrent surveillance processes seem to curtail frequent positive and constructive “above-
and-beyond” behaviours in the workplace. Researchers, in this line, observe that “employees’ sense
of emotional and mental resource depletion avert them from putting extra effort or spending personal
time in activities that exceed job requirements.”273Extra-role behaviours, which “are discretionary
workplace behaviours that exceed employees’ basic job requirements”274 are curtailed. Contrary to
this, employees may engage in additional positive behaviours to create a good impression and stay
“on the good side” of evaluators, leading to defective work performance.
A deep analysis of surveillance and social process shows that changes in employees’ social
preferences is also relevant here. For limitations of surveillance also challenge the dynamic features
and characteristics of social life and the well-being of all individual employees. The previously
discussed study by Falk and Kosfeld on the hidden costs of control also concludes that employees’
willingness to act selflessly is reduced and interest in improving performance decreases.275 This study
confirms that most employees exhibit “control-averse behaviour,” i.e., they are less motivated to
Albert Bandura, Social Learning Theory (New York: General Learning Press, 1971), 3-11; and, Robin M.
Hartinger-Saunders and Christine M. Rine, “The Intersection of Social Process and Social Structure Theories
to Address Juvenile Crime: Toward a Collaborative Intervention Model,” Journal of Human Behaviour in the
Social Environment 21, no. 8 (2011): 910-911. 267 Ball, “Workplace Surveillance: An Overview,” 98. 268 Ball, “Workplace Surveillance: An Overview,” 96. 269 Ball, “Workplace Surveillance: An Overview,” 99. 270 Gagné and Deci, “Self-Determination Theory and Work Motivation,” 350. 271 Mishra and Crampton, “Employee Monitoring: Privacy in the Workplace?” 10. 272 Ball, “Workplace Surveillance: An Overview,” 96. 273 Laura Petitta and Michele Vecchione, “Job Burnout, Absenteeism, and Extra Role Behaviours,” Journal of
Workplace Behavioural Health 26, no. 2 (2011): 98. 274 Petitta and Vecchione, “Job Burnout, Absenteeism, and Extra Role Behaviours,” 105. 275 Falk and Kosfeld, “The Hidden Costs of Control,” 1616.
Power Distance and Social Sorting
182
strive for high performance if employers unnecessarily force them to perform.276 Falk and Kosfeld
prefer trusting relationships over controlling relationships. Observing surveillance and the resulting
changes in the social process also identifies the emergence of a “virtual self,” a new form of the
employee as a social being with “a composite of multiple digital information sources,” whose
“ubiquity and multidimensionality […] pose greater threats to personal freedom and social
security.”277 By this, employees feel captive while engaged in different activities in the workplace.
Thus, complete monitoring changes our social order, and in particular how employees as citizens
live, explore, define, and sometimes limit their physical, moral, and institutional boundaries.
To sum up this section, electronic surveillance creates adverse employee behavioural patterns in
organizations, leading to job dissatisfaction and decreased productivity and reduced trust. It also
leads to mental illnessness such as increased stress, a sense of powerlessness and vulnerability, and
heightened rates of turnover, absenteeism purposeful negligence of extra-role behaviours. In
continuation to this, what effects make the the Indian context distinctive are explored in the
concluding section.
4.5 A DIGITALIZED CASTE SYSTEM AND EMPLOYEE COLONIZING: THE INDIAN SCENARIO
Since systems of surveillance are identified as “mechanisms for societal differentiation,”278 it is high
time to examine a few unique impacts of workplace surveillance in the previously discussed cultural
and socio-economic context of India. A sudden progression or change is experienced in Indian work
situations, as a previously discussed, including the shift from agriculture-based rural society to
industry-based urban society and from there to the present information-based metropolitan society.
This is rapid and difficult to handle. The adaptation to the industrial revolution itself, for example,
brought with it, along with economic advancement and employment specification, an altered work
method reflecting and synchronizing Western lines of work structures and processes and a Western
worldview. Premilla D’Cruz, analysing this fatalistic outlook of Indian work scenario alterations,
rightly points out that “rooted in the logical imperatives of industrialism, which dictates movement
away from traditional social and economic patterns where familial, filial and ethnic factors
predominate, these workplaces emphasize universalism, professionalism, rationality, functional
specificity, and contractual relations, privileging merit, competence, rules, and interest-based/class-
based associations.”279 However, D’Cruz observes that, though exposed to Western influences and
hence undergoing a subsequent assimilation and transformation, “the Indian ethos continues to
prevail and thus Indian workplaces reflect a confluence between Indian culture and Western
industrialism.”280 This in fact indicates the need for a investigation of the distinctive Indian work
scenario.
Technology has today taken centre stage in Indian organizational workplaces and has had both
constructive and destructive features. The widely-implemented surveillance systems and
technologies in the organizational workplaces, with their classifying drive, function through different
perspectives and must be examined in view of proper circumstantial evidence. As we have discussed
above, the drive for “classification does not emerge naturally from some intrinsic characteristics of
276 Falk and Kosfeld, “The Hidden Costs of Control,” 1628. 277 Mun-Cho Kim, “Surveillance Technology, Privacy and Social Control: With Reference to the Case of the
Electronic National Identification Card in South Korea,” International Sociology 19, no. 2 (2004): 202. 278 Surveillance systems, in line with the assigned status of populations now construct differences and by
normalizing this difference, regulate them. Torin Monahan, “Editorial: Surveillance Inequality,” Surveillance
& Society 5, no. 3 (2008): 219. 279 D’Cruz, Workplace Bullying in India, 13. 280 D’Cruz, Workplace Bullying in India, 13.
Power Distance and Social Sorting
183
persons or things but rather from culturally defined perspectives that are often associated with
economic and political power.”281 For any shared and structured values and beliefs systems
underlying a cultural context result in generating norms for commonly accepted behaviours in a
society. The same principle is applied in an organizational context too, where various background
cultures have considerable influence on employee behaviours and attitudes. Thus, long-term
exposure to continuous monitoring and the consequent forceful behavioural alteration adversely
affects their motivations and brings about job exhaustion and a detached response.
Indian society has been conceived generally as having a relational character, where there is a
coexistence of individualism and collectivism. We have already explored this in the second chapter.
Due to this, generally, the social affiliation of each member has been endorsed, providing mutual
support and sense of belonging.282 Geert Hofstede observes that power distance has been generally
endorsed in Indian workplace culture, and hence that employees tend to be willing to accept an
unequal power distribution. Accordingly, as D’Cruz contends, “favouritism and nepotism thrive,
with ingroup members receiving privileges and outgroup members being discriminated against.”283
Along this same line, the mirroring phenomena of collectivism, hierarchical power distance, low
gender egalitarianism and other-oriented social practices mark the distinctiveness of employee
behaviour in organizations in India. Employees tend to accept this type of power gap and perceive it
as a part of workplace discipline. Social power control exercised by electronic surveillance systems
and simultaneous instructive and punitive communications of management about those systems have
put in place various sets of behavioural norms among employees. In this field, we can distinguish the
following three categories: (1) the emergence of a new caste structure and digital colonising; (2)
deviant attitudes and behavioural practices; and (3) perceived occupational violence and resultant
anti-social behaviours.
4.5.1 A New Caste Structure through Digital Colonizing
High power distance and the hierarchical systems that result determine the interpersonal and
intergroup interactions in India, and “those higher up in the hierarchy enjoy power over those
below.”284 Employee surveillance now re-creates an ingrained mindset of power distance, and thus
promotes caste differentiation in Indian workplaces. In many workplaces today, employees are
digitally connected with one another through computer and internet systems, and this linked
association changes employee lives. The ethnographic example of the Indian caste system has been
previously explained in the second chapter. The re-formed classless social groups and working class
of this post-modern era are now differentiated through digital monitoring technologies in workplaces.
We recall that the Criminal Tribes Act, enacted in India in 1871 by the British colonial government
declared that people from certain casts have inherent criminal tendencies (presumed guilty by birth),
falsely targeted people by accusing them criminal and illicit activities (without confirming reports),
and restricted their movements and socialization. In the same way, electronic monitoring practices
target suspected groups in high volume and isolate them by attributing to them an assumption of bad
character.285 As previous observations prove, the use of unobtrusive technologies to monitor the
281 Kim, “Surveillance Technology, Privacy and Social Control,” 197. Originally from: Philip Doty, “Digital
Privacy: Toward a New Politics and Discursive Practice,” Annual Review of Information Science and
Technology 35 (2001): 151. 282 D’Cruz, Workplace Bullying in India, 9. 283 D’Cruz, Workplace Bullying in India, 9. 284 D’Cruz, Workplace Bullying in India, 10. 285 Ramnarayan Rawat, Reconsidering Untouchability: Chamars and Dalit History in North India
(Bloomington: Indiana University Press, 2011): 26–27; Henry Schwarz, Constructing the Criminal Tribe in
Colonial India: Acting Like a Thief (USA: Wiley-Blackwell, 2010): 69–78; Birinder P. Singh, Criminal
Tribes of Punjab: A Social-Anthropological Inquiry (New York: Routledge, 2010): liv–lvi; Vinayak
Power Distance and Social Sorting
184
workplace and activities implicitly presumes that every employee is “potentially guilty.” This leads
to a segregation of human rights in ways equivalent to other dimensions of citizenship.
Similarly, just like some caste identities and memberships are being criminalised while others enjoy
preferential treatment in India today, some employees are perceived to be predisposed to criminal
behaviours, both due to their supposed hereditary dispositions and due to socio-cultural norms,
traditions and practices. Employers often act upon this presumption in workplaces.286 This employee
discrimination though digital captivity may be identified as India’s old practice of maltreatment of
Dalits - India’s hidden apartheid - that reappears in modern workplaces in a more polished form.287
Referring to the ‘2006 Khairlanji murder case’ – the brutal murder of an entire Dalit family – Anand
Teltumbde, for instance, argues that, though the constitution of India formally abolished the caste
system, this system persists and is well assimilated to globalizing India, and it expresses itself through
acts of crime against members of the Dalit castes.288 This caste differentiating practices now finds a
new ally and is reflected in several areas of human life mediated through technological
advancements. Referring to a study by David Flaherty on privacy protection, James Rule and Peter
Brantley point out that surveillance is directed more specifically at employees who represent the less
powerful segments of society, such as typists or low-level data processers.289 The less powerful are
more affected by the system. In India, the above said differential surveillance is also articulated as
marginalizing surveillance, such that “the creation or enforcement of conditions of marginality
through the application of different surveillance systems for different populations.”290 This would
mean that the cultural and class domination of Indian caste practices are re-enacted in organizational
workplaces through a new “digital domination” by hierarchical authorities, enabled by digital
monitoring systems.
According to a study by Ernesto Noronha and Premilla D’Cruz, the negative effects of stringent
monitoring in Indian organizational workplaces, especially in IT, ITeS workplaces, BPOs and call
centres, is closely related to psycho-physical health problems. Employees detail how difficult it is to
leave the system even to use the restroom or “get a breather” when strict monitoring and the resultant
time binding is at hand.291 This amounts to a colonising experience among employees – a new form
of digital or electronic colonizing. For “the intensive and individualistic nature of the work, the
inability to interact with colleagues or leave work stations, […] complex and variable shift patterns,
Chaturvedi, Peasant Pasts History and Memory in Western India (Berkeley, USA: University of California
Press, 2007): 122–126; Jagan Karade, Development of Scheduled Castes and Scheduled Tribes in India
(Newcastle, UK: Cambridge Scholars, 2014): 25, 23–28; Schwarz, Constructing the criminal tribe in colonial
India: acting like a thief, 99–101. 286 Nicholas B. Dirks, The Scandal of Empire: India and the Creation of Imperial Britain (Harvard: Harvard
University Press, 2006), 27; Frank de Zwart, “The Logic of Affirmative Action: Caste, Class and Quotas in
India,” Acta Sociologica 43, no. 3 (2000): 235. 287 Gopal Guru and Shiraz Sidhva, “India’s “Hidden Apartheid”,” UNESCO Courier, 2001,
https://www.questia.com/magazine/1G1-79007221/india-s-hidden-apartheid [accessed March 25, 2017]. See
also the reference for this hidden apartheid, the caste segregation of entire villages, in: William A. Haviland,
Harald E.L. Prins, Dana Walrath and Bunny McBride, The Essence of Anthropology, 3rd ed. (Belmont, CA:
Wadsworth, 2013), 284. 288 Anand Teltumbde, The Persistence of Caste: The Khairlanji Murders and India’s Hidden Apartheid
(London: Zed Books, 2010), 9-39, 173-188. 289 Rule and Brantley, “Computerized Surveillance in the Workplace: Forms and Distributions Source,” 417. 290 Monahan, “Editorial: Surveillance Inequality,” 220. 291 Ernesto Noronha and Premilla D’Cruz, “Engaging in Professional: Organising Call Centre Agents in India,”
Industrial Relations Journal 40, no. 3 (2009): 219.
Power Distance and Social Sorting
185
management control strategies such as close monitoring,”292 etc. This leads to an upsurge in this
captivity in the digital workplace. The hypersensitivity of management to comply with targets and
deadlines leads them, for example, to watch and check employees who are on sick leave, asking for
their mandatory return with warnings of blocking salaries, and thus tends to produce a colonising
experience.293 Another example is the practice of employees’ self-enforced ‘long hours of working’
beyond shift hours to impress authorities and ensure their own positions. Noronha and D’Cruz
illustrate in this regard that,
These long hours at work were extended by the ordeal of road travel, leaving agents with no time
to take care of their family chores or attend social gatherings, which included religious festivities,
at times making them question their own existence. They seemed helpless at having to
compromise on culture, friends and family. For instance, there was nothing that employees could
do even when their spouses complained of not having the time to speak to each other or share a
meal with family members for weeks on end.294
This monitoring through technology-based mechanisms causes added dissatisfaction in the
workplace and has effect we have discussed above: employee turnover, absenteeism and a sense
among employees that they are being colonised. A plethora of employee monitoring and control
mechanisms, which reduce the chance of self-discretion and collective representation, broadens the
intensity and extension of this experience.
4.5.2 Behavioural Deviances in Work-Life Attitudes and Practices
The above-discussed general behavioural patterns of labour turnover, attrition, and absenteeism are
alarmingly on the increase in the Indian IT/BPO sectors.295 The main factors that determine
employment exit or absenteeism are job security and job stress, along with the “nature of the
organization such as supervision” and other such intruding industrial conditions.296 For instance, the
work traditions of India, which enabled workers to devote their whole being to a company and spend
their entire work lives in a single career, even with low financial rewards, is challenged and altered
with the current short-termist attitude of the labour market. This is exacerbated by issues like a “lack
of control, extensive monitoring, the prevalence of targets and the brevity and infrequency of breaks
all leads to emotional exhaustion and withdrawal”297 and leads to high levels of job dissatisfaction
and the consequent increased job attrition and absenteeism.298 Absenteeism in work is defined as
292 Noronha and D’Cruz, “Engaging in Professional: Organising Call Centre Agents in India,” 215. See also,
Patricia Todd, Joan Eveline, Leonie Still and Judy Skene, “Management Responses to Unions in Australian
Call Centres: Exclude, Tolerate or Embrace?” Australian Bulletin of Labour 29, no. 2 (2003): 162–176. 293 Noronha and D’Cruz, “Engaging in Professional: Organising Call Centre Agents in India,” 220. 294 Noronha and D’Cruz, “Engaging in Professional: Organising Call Centre Agents in India,” 220. 295 Aruna Ranganathan and Sarosh Kuruvilla, “Labour Turnover in the Business Process Outsourcing Industry
in India,” in Management Practices in High-Tech Environments, eds. D. Jemielniak and Kociatkiewicz
(Hershey, PA: IGI Global, 2008), 110–132; Pawan Budhwar, Neeru Malhotra and Virender Singh, “Work
Processes and Emerging Problems in Indian Call Centres,” in The Next Available Operator: Managing
Human Resources in Indian Call Centres/BPO Providers, eds. Mohan Thite and Bob Russell (Delhi: Sage,
2009), 59–82. 296 Demirbag et al., “Employee Service Abandonment in Offshore Operations,” 179. 297 Demirbag et al., “Employee Service Abandonment in Offshore Operations,” 179. 298 Pawan S. Budhwar, Arup Varma, Virender Singh and Rohin Dhar, HRM Systems of Indian Call Centres:
An Exploratory Study, International Journal of Human Resource Management 17, no. 5 (2006): 881–897;
Neeru Malhotra, Pawan Budhwar and Peter Prowse, “Linking Rewards to Commitment: An Empirical
Investigation of Four UK Call Centres,” International Journal of Human Resource Management 18, no. 2
(2007): 2095–2127; and, Phil Taylor and Peter Bain, “India Calling to the Far Away Towns: The Call Centre
Labour Process and Globalisation,” Work Employment and Society 19, no. 2 (2005): 261–280.
Power Distance and Social Sorting
186
“workers absence from their regular task when he is normally schedule to work”299 and thus is the
“lack of presence of an employee for a planned work.”300 A close study of absenteeism in the Indian
organizational workplace reveals that there are many factors that lead to this, in addition to
commonly perceived reasons such as sickness and low vitality, lack of available transport facilities,
long hours of work, nightshift, rural exodus, accidents, social and religious functions, drinking and
amusement, the nature of work, etc. As S. Rabiyathul Basriya argues, these include other personal
factors such as personal attitude, age, seniority, and gender, as well as workplace factors such as
stress, work routine, and satisfaction.301 It also becomes a part of employees’ resistance to such unfair
practices.
Several studies of Indian organizational employees and call centre workers have found that elevated
levels of electronic monitoring lead to increased stress, higher emotional exhaustion, and predicted
burnout, with dimensions of frustration and cynicism. They result in reduced efficacy and high rates
of absenteeism.302 Research in the same field shows again that employee quit rates are lower when
electronic monitoring is lower.303 Another form of workplace deviance is “presenteeism”304 – where
employees are physically present but mentally absent. The phenomenon of presenteeism is generally
defined as “attending work while ill,” which adversely affects the productivity and well-being of
employees.305 One cannot always view presenteeism negatively, however, as leading to decreased
health and thus productivity loss, since it also possesses more positive aspects, given that employee’s
presence at work can be motivated by other interests such as the aim to satisfy monitory or appraisal
intentions or garner praise.306 It often leads employees to assume a sick role while at work and to be
generally disengaged. Gary Johns, in this regard, speaks about the “draconian monitoring” that
299 S. Rabiyathul Basriya, “Employee Absenteeism in Indian Industries,” International Journal of Science and
Research 4, no. 10 (2015): 141. 300 Basriya, “Employee Absenteeism in Indian Industries,” 145. 301 Basriya, “Employee Absenteeism in Indian Industries,” 142-143. 302 R. Batt, V. Doellgast and H. Kwon, “Service Management and Employment Systems in U.S. and Indian
Call Centres,” in Brookings Trade Forum 2005: Offshoring White-Collar Work – The Issues and Implications,
eds. S. Collins & L. Brainard, 335-372 (Washington, D.C.: The Brookings Institution, 2005), 342. See other
references: Jagdi Singh, “Performance Productivity and Quality of Frontline Employees in Service
Organizations,” Journal of Marketing 64, no. 2 (2000): 15–34; David Holman, “Employee Well-Being in
Call Centres,” in Call Centres and Human Resource Management, eds. Stephen Deery and Nick Kinnie
(Basingstoke: Palgrave. 2004), 223–244; David Holman, Claire Chissick and Peter Totterdell, “The Effects
of Performance Monitoring on Emotional Labour and Well-Being in Call Centres,” Motivation and Emotion
26, no. 1 (2002.): 57–81. 303 Batt, Doellgast and Kwon, “Service Management and Employment Systems in U.S. and Indian Call
Centres,” 343. See, Rosemary Batt, Alex Colvin and Jeffrey Keefe, “Employee Voice, Human Resource
Practices, and Quit Rates: Evidence from the Telecommunications Industry,” Industrial and Labour Relations
Review 55, no. 4 (2002): 573–593; Jason D. Shaw, John E. Delery, G. Douglas Jenkins Jr., and Nina Gupta,
“An Organization-Level Analysis of Voluntary and Involuntary Turnover,” Academy of Management Journal
41, no. 5 (1998): 511–525. 304 Gunnar Aronsson and Klas Gustafsson, “Sickness Presenteeism: Prevalence, Attendance-Pressure Factors,
and an Outline of a Model for Research,” Journal of Occupational and Environmental Medicine, 47, no. 9
(2005): 958–966; Prageetha G. Raju, “Different Manifestations of Presenteeism at Workplace: A Study of
Behaviour of Employees in I.T. Sector in India,” SSRN eLibrary, (April 15, 2012).
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2039848 [accessed April 10, 2017]; Petri Bockerman
and Erkki Lakkenen. “What Makes You Work while You are Sick? Evidence from a Survey of
Workers.” European Journal of Public Health 20, no. 1 (2010): 43-46. 305 Stephen Deery, Janet Walsh and Christopher D. Zatzick, “A Moderated Mediation Analysis of Job
Demands, Presenteeism, and Absenteeism,” Journal of Occupational and Organizational Psychology 84
(2014): 352; Gary Johns, “Presenteeism in the Workplace: A Review and Research Agenda,” Journal of
Organizational Behaviour 31 (2010): 519. 306 Johns, “Presenteeism in the Workplace: A Review and Research Agenda,” 521.
Power Distance and Social Sorting
187
stimulates employee presenteeism.307 Systemic pressure, such as continuous monitoring and “fixed
trigger points” for absence, leads to disciplinary action and stimulates higher attendance, though also
intentional presenteeism can be a form of a resistance to these practices of management.308 Likewise,
fear of job loss and commonly experienced unfavourable and impartial employee treatments and job
insecurity all reduce absenteeism and increase presenteeism in the workplace. Similarly,
presenteeism is a more dangerous form of occupational deviance than absenteeism, since it is not
always evident with what intention an employee is present for work.
Beyond the challenges of absenteeism, presenteeism and “high and chronic employee turnover,”
researchers have also examined the phenomenon of “job abandonment.” This becomes more
problematic and challenging in the context of BPO organisations in India.309 This job abandonment,
mostly described as “no-call/no-show” involves the “abrupt and un-informed departure of employees
to join another call centre.”310 This means that the organizational workforce, including both software
professionals and BPO employees, for example, who have come to believe that working in an
electronically monitored environment makes their tasks more complex, are dissatisfied and leave
their job.311 Electronic monitoring in the organizational workplace both directly and indirectly
envisages reduced job performance and negative job attitudes, leading to lower job satisfaction and
less affective commitment due to the above-discussed perception of power control among employees.
This also fosters employee turnover and reduces organizational citizenship behaviours. Brian P.
Niehoff and Robert H. Moorman also state that frequent electronic supervisory control often
functioned to encourage employee behaviours associated with reciprocity, altruism, courteousness,
conscientiousness, and civic virtue and minimized opportunities for social exchanges.312 Thus, all
these analyses point to main factors determining employment exit, which include job security and
job stress as well as other intruding industrial conditions of employee electronic supervision.
It is observed that Indian call centres “exhibit particularly egregious conditions of surveillance.”313
In a case study of multi-surveillances in the global interactive service industry, based on the Indian
call centre industry, Winifred R. Poster expresses concern: “why are Silicon Valley entrepreneurs
producing software to monitor digitally the emotions of Indian call centre workers?”314 Analysing
and exploring the effects of surveillance in Indian call centres, apart from and beyond concepts
associated with classical labour theories such as the “electronic sweatshop,” Poster identifies the role
307 Johns, “Presenteeism in the Workplace: A Review and Research Agenda,” 527. 308 Johns, “Presenteeism in the Workplace: A Review and Research Agenda,” 525. 309 Mehmet Demirbag, Kamel Mellahi, Sunil Sahadev and Joel Elliston, “Employee Service Abandonment in
Offshore Operations: A Case Study of a US Multinational in India,” Journal of Business Ethics 47 (2012):
178. 310 Demirbag et al., “Employee Service Abandonment in Offshore Operations,” 178. 311 Geetha Kumari, Gaurav Joshi and K.M. Pandey, “Factors Influencing of Job Satisfaction among Employees
in Software Industries: A Case Study of Wipro Ltd., Greater Noida, India,” Advances in Economics and
Business Management 2, no. 7 (2015): 752. 312 Brian P. Niehoff and Robert H. Morman, “Justice as a Mediator of the relationship between Methods of
Monitoring and Organizational Citizenship Behaiour,” Academy of Management Journal 36, no. 3 (1993):
527-556; Russell Cropanzano and Marie S. Mitchell, “Social Exchange Theory: An Interdisciplinary
Review,” Journal of Management 31, no. 6 (2005): 874-900; and, Debora Jeske and Alecia M. Santuzzi,
“Part-Time Workers’ Responses to Electronic Performance Monitoring,” International Journal on Working
Conditions 8 (2014): 63-82. 313 B. P. Remesh, “Work Organization, Control, and “Empowerment”: Managing the Contradictions
of Call Centre Work,” in In an Outpost of the Global Economy, eds. C. Upadhya and A. R. Vasavi (London:
Routledge, 2008), 235-262. See, Winifred R. Poster, “Emotion Detectors, Answering Machines, and E-
Unions: Multi-Surveillances in the Global Interactive Service Industry,” American Behavioural Scientist 55,
no.7 (2011): 869. 314 Poster, “Emotion Detectors, Answering Machines, and E-Unions,” 869.
Power Distance and Social Sorting
188
of ICTs and the resultant web of multi-surveillances in control process today exercised by
management against employees. Poster describes Indian call centres as “sites of radically invasive
technological control on peoples’ bodies and mental constitutions.”315 This situation of complete
surveillance and monitoring, in turn, leads to disengagement in the workplace. This means that
employees who are not fully engaged in the workplace, as a matter of passive resistance to ubiquitous
monitoring, also spread negativity among co-workers, prompting them to be disengaged in the
workplace in one form or another. The percentage of the disengaged workforce, according to the
Gallup global performance-management consulting company, in a study on the State of the Global
Workplace, states that only 13% of global employees are engaged at work.316 According to the study,
only 10% of workforce is fully engaged in South Asia, and only 9% in India.
Another form of behavioural deviance is attention seeking or impression management. Employees
with dependence proneness try to be profligately obliging to authorities, accepting their power
domination.317 A person with an active self-presentation seeks to make a positive impression on the
dominant agent in order to enhance their image before others. Jai B.P. Sinha indicates how an
impression is formed and managed, stating that “impression formation is about how and what picture
or impression a perceiver forms about another person who is being perceived. In impression
management, the person being perceived manages the perception of the perceiver hoping to have a
positive impact.”318 Employees manipulate this impression by being even dis-comfortably obedient
to the dominant authority in order to seek their attention and praise and secure a good image among
their co-workers. Employees respond differently to surveillance, altering their behaviour to secure
the same. According to D’Cruz, “there is acceptance, accompanied by both acquiescence and
deference to those in superior positions and a desire to acquire such a position and enjoy the benefits
that come with it. This instance is characterized by the view that a positive relationship with the
superior figure will prove advantageous.”319 Employees thus highlight constructive and optimistic
attributes for favoured treatment and restrain purposefully deficient and risky activities to achieve
desired outcomes, often in manipulative ways.
315 Poster, “Emotion Detectors, Answering Machines, and E-Unions,” 869. Researching in Indian context,
multi-surveillance model speaks over-against the technological determinism emphasised by the sweatshop
model that the power accumulated and exercised by the elites [managers] is now vested in all actors and
embedded in social relations depending upon each context. He proposed this multi-surveillance model and
proved his premises by analysing the shift form electronic sweatshop to the present multi-surveillance model.
The site of surveillance is internal to call centres in the electronic sweatshop model, whereas it reaches
worldwide interactive service web, both internal and external, to the call centre in multi-surveillance model.
The agents of surveillance are the managements in the former and uses often computers for the same while
managers, workers, consumers, clients and all stakeholders are functional agents in the latter and uses codes,
internet and all other everyday technologies. In the same way, the former projects a unidimensional dynamism
of surveillance where managers monitor workers, but the latter has a pluralized and networked dynamism
where the possibility of all participants surveille each other is guaranteed. Poster, “Emotion Detectors,
Answering Machines, and E-Unions,” 871. 316 Steve Crabtree, “Worldwide, 13% of Employees Are Engaged at Work,” Gallup, October 8, 2013.
http://www.gallup.com/poll/165269/worldwide-employees-engaged-work.aspx [accessed March 25, 2017].
Gallup is an American research-based company founded by George Gallup in 1935 that functions as a global
performance-management consulting company and now provides research and strategic consulting to huge
organizations and other large establishments in various countries. Ira Boudway, “Right or Wrong, Gallup
Always Wins,” Bloomberg, November 9, 2012. https://www.bloomberg.com/news/articles/2012-11-
08/right-or-wrong-gallup-always-wins [accessed March 25, 2017]. 317 Jai B.P. Sinha, Culture and Organizational Behaviour (New Delhi: Sage Publications, 2008), 104. 318 Sinha, Culture and Organizational Behaviour, 104. 319 D’Cruz, Workplace Bullying in India, 10.
Power Distance and Social Sorting
189
4.5.3 Surveillance, Occupational Violence and Anti-Social Behaviours
Workplace surveillance leads to another recurring behavioural phenomenon called occupational
violence or workplace violence. This is a workplace hazard leading to further adverse occurrences
inside and outside the workplace. Violent actions and harassment (physical, mental, or sexual) are
forms of aggressive behaviours in the workplace and are defined as workplace violence.320 Referring
to the European Commission’s Guidance on the Prevention of Violence at Work, Michele Antoinette
et al. write that this occupational violence involves, “incidents where persons are abused, threatened
or assaulted in circumstances related to their work, involving an explicit or implicit challenge to their
safety, well-being or health.”321 Thomas H. Shea defines occupational or workplace violence as “any
act against an employee that creates a hostile work environment and negatively affects the employee
either physically or psychologically. These acts include all types of physical or verbal assault, threats,
coercion intimidation and all forms of harassment.”322 Another precise definition of workplace
violence is offered by the National Occupational Health and Safety Commission, which states that
“occupational violence is the attempted or actual exercise by a person of any force so as to cause
injury to a worker including any threatening statement or behaviour which gives a worker reasonable
cause to believe he or she is at risk.”323 So, any work-related incident of abuse, assault or threat
happening within or outside the workplace that puts at risk employee health and safety is a workplace
hazard and can be regarded as workplace violence.
Both social and situational factors lead to aggressive behaviours in the workplace.324 Referring to Jai
B.P. Sinha and specifially to the Indian socio-cultural context, D’Cruz observes that “there is
discomfort experienced in terms of restricted autonomy, absence of egalitarianism and lack of
connectedness, all of which could precipitate a sense of alienation, unfairness and even exploitation,
sometimes leading to covert or overt aggression.”325 For as the Indian socio-cultural inclination or
ethos for both individualism and collectivism rightly suggests, employees espouse and long for both,
simultaneously, individualistic autonomy and creativity and collectivistic workplace affiliations.326
320 Kavita Singh, Organizational Behaviour: Text and Cases, 3rd ed. (Noida, New Delhi: Vikas Publishing
House, 2015), 182. 321 R. Wynne, N. Clarkin, T. Cox and A. Griffiths, Guidance on the Prevention of Violence at Work (Brussels:
European Commission, DG-V, Ref.CE/V1-4/97, 1997); Michele Antoinette Paludi, Rudy V. Nydegger and
Carmen A. Paludi, Understanding Workplace Violence: A Guide for Managers and Employees (Westport:
Praeger, 2006), 14; Stephen J. Morewitz, Death Threats and Violence: New Research and Clinical
Perspectives (San Francisco: Springer, 2008), 89. 322 Thomas H. Shea, “Workplace Violence: Turning Down the Heat,” Workplace Violence Prevention Report
6 (2000); Paludi, Nydegger and Paludi, Understanding Workplace Violence: A Guide for Managers and
Employees, 14-15. 323 National Occupational Health and Safety Commission, “Program One Report: Occupational Violence,” 51st
Meeting of NOHSC (Hobart: NOHSC, 1999), 1; Shea, “Workplace Violence: Turning Down the Heat,” 15. 324 Joel H. Neuman and Robert A. Baron, “Workplace Violence and Workplace Aggression: Evidence
Concerning Specific Forms, Potential Causes, and Preferred Targets,” Journal of Management 24, no. 3
(1998): 391-419. 325 D’Cruz, Workplace Bullying in India, 10-11. Jai B.P. Sinha, Culture and Organizational Behaviour (New
Delhi: Sage Publications, 2008), 28-52; Jai B.P. Sinha, “A Cultural Perspective on Organizational Behaviour
in India,” in New Perspectives on International Industrial/Organizational Psychology, eds. Christopher P.
Earley and M. Erez (San Francisco: Lexington Press, 1997), 53-74; Jai B.P. Sinha and R.N. Kanungo,
“Context Sensitivity and Balancing in Organizational Behaviour,” International Journal of Psychology 32,
no. 2 (1997): 93-106. 326 D’Cruz, Workplace Bullying in India, 13. D’Cruz writes, referring to researchers like Jai B.P. Sinha, Sudhir
Kakar and Katharina Kakar, that “personalized relationships and exchanges, identity-based interactions and
hierarchical systems with related ingroup-outgroup affiliations and power distance influences work-life.” Jai
B.P. Sinha, Culture and Organizational Behaviour (New Delhi: Sage Publications, 2008); Sudhir Kakar and
Power Distance and Social Sorting
190
Aggressive behavioural tendencies emerge when the balance between these individual and collective
factors is lost. Ram Raghavan regards this negative behaviour as ‘toxic’ behaviour that “causes harm,
damages relationships or generates endless adverse feeling in other people, [which] can be
detrimental to both individuals and businesses.” In his view, it is on rise in the workplace.327
Concerning this aggressive behaviour, within the scope of this study, we can say that ubiquitous and
constant electronic monitoring (situation factors) and the results of this – unfair treatment, frustrating
events and aggressive norms (social factors) – lead to hostile or biased attitudes and aggressive
thoughts and feelings, and in turn to aggressive and violent responses in the workplaces.
Figure 1, below, offers a pictorial representation of this. As we see, strict monitoring increases levels
of stress and hostility and resentment, which produces anger among employees and may lead to
occupational violence.
Figure 1 Surveillance and Aggressive Behaviours
Violence may occur between employer and employee or among employees themselves, and may
involve workplace bullying, physical and psychological assaults, verbal abuse or intentional
isolation, etc.328 All these phenomena give employees a feeling of being at risk either physically or
mentally or both. This, along with low self-esteem, negative feelings, and employees’ changing
moods, can lead to further aggressive behaviour of employees towards one another, causing physical,
emotional or psychological harm.329 This occupational violence, therefore, is marked by several
behavioural effects in various realms, including individual violence (hurting oneself, substance
abuse, suicide as its extreme form); organizational violence (stealing, damaging property, reputation
mutilation, against co-workers, clients or customers); domestic violence (against intimate partner and
family); and social violence (against friends, peer members, other social groups).330 Other results
Katharina Kakar, The Indians: Portrait of a People (New Delhi: Penguin, 2007); D’Cruz, Workplace Bullying
in India, 13. 327 Ram Raghavan, Human Capital Management Challenges in India (Oxford: Chandos Publishing, 2011), 68. 328 J. Barling, “The Prediction, Experience, and Consequences of Workplace Violence,” in Violence on the
Job: Identifying Risks and Developing Solutions, eds. G. R. Vanden Bos and E. Q. Bulatao (Washington DC:
American Psychological Association Press, 1996), 29-51; J. Barling, K. Dupr´e and E. Kelloway, “Predicting
Workplace Aggression and Violence,” Annual Review of Psychology 60 (2009): 671-692. 329 Michele Antoinette Paludi, Rudy V. Nydegger and Carmen A. Paludi, Understanding Workplace Violence:
A Guide for Managers and Employees (Westport: Praeger, 2006), 16, 40. 330 Duncan Chappell and Vittorio Di Martino, Violence at Work (Geneva: International Labour Office, 2006);
Julian Barling, Kathryne E. Dupr´e and E. Kevin Kelloway, “Predicting Workplace Aggression and
Violence,” Annual Review of Psychology 60 (2009): 671-692; Claire Mayhew and Michael Quinlan, “The
Relationship between Precarious Employment and Patterns of Occupational Violence: Survey Evidence from
Thirteen Occupations,” in Health Effects of the New Labour Market, eds. Kerstin Isaksson, Christer Hogstedt,
Charli Eriksson, and Töres Theorell (New York: Kluwer Academic/Plenum Publishers (2002), 183-205;
Power Distance and Social Sorting
191
may include sleep disturbances and speech difficulties; aggressive driving and proneness to
accidents; forgetfulness and lack of attention; over-sensitivity, lowered self-esteem and more angry
outbursts; diminished confidence and initiatives, and subsequent momentary escapism; or increased
smoking or drug and alcohol abuse, etc..
Finally, unlike workplace behavioural deviances like absenteeism, job abandonment and passive-
agressivenes, which represent a ‘flight’ response, workplace aggression and subsequent violence
represents a ‘fight’ reaction to stress and other exhausting feelings of working under continuous
monitoring and surveillance.331 Thus, to sum up, feelings of insecurity, uncertainty and deprivation,
along with added stress and distrust, all increasingly contribute to “interpersonal competition and
friction, mutual distrust, rivalry, and destructive behaviour.”332 All these phenomena will be
examined and explored in detail in the next chapter, where we will analyse a narrative and qualitative
empirical study conducted as part ofthis research. The study was conducted online with IT, ITeS,
BPO employees working in different domestic and international sectors in India.
4.6 CONCLUSION
A person is inescapably a social being, an ‘embodied social agent,’ with all the rights and duties this
entails. There is an urgent need, therefore, to reinstate the social and ethical aspects in analysis of
workplace relations within the context of electronic surveillance. This chapter proves that the
concerns noted in the previous chapter – particularly with respect to individual, employee rights of
privacy – do not entirely convey or critically analyse the whole story about surveillance and why it
matters in the workplace. Our comprehensive and critical reading of electronic surveillance in the
workplace has shown that along with employee privacy violations, it was imperative to search for
further detrimental effects that harm employees’ fuller experience of his or her personhood and
individual identity. Therefore, this chapter has dealt with concerns about categorization, coding,
disappearing bodies, and mobilities that have more detrimental and thus more ethical implications.
Although some forms of classification can reasonably be seen as necessary in social situations, for
reasons of maintaining governance and social order, these have become today increasingly invisible,
intruding, dehumanizing and are often taken for granted. This can have adverse effects in particular
contexts. At this stage of the study, surveillance could be explained as ‘policing at a distance’333 and
simultaneously projects power disparities.
This chapter, thus, focused on the complete array of surveillance concepts and going beyond the
range of mere privacy boundaries, has concerned the following: surveillance and discriminating
social relations, surveillance and power asymmetries and control, surveillance and the human body,
Liane Greenberg and Julian Barling, “Predicting Employee Aggression against Co-workers, Subordinates and
Supervisors: The Roles of Person Behaviours and Perceived Workplace Factors,” Journal of Organizational
Behaviour 20, no. 6 (1999): 897-913; Manon Mireille LeBlanc and Julian Barling, “Understanding the Many
Faces of Workplace Violence,” in Counterproductive Workplace Behaviour: Investigations of Actors and
Targets, eds. Suzy Fox and Paul E. Spector (Washington, DC: American Psychological Association,2005),
41-63; Eric F. Sygnatur and Guy A. Toscano, “Work-Related Homicides: The Facts,” Compensation and
Working Conditions 2 (2000): 5; Karl Aquino, “Structural and Individual Determinants of Workplace
Victimization: The Effects of Hierarchical Status and Conflict Management Style,” Journal of Management
26, no. 2 (2000): 171; Aaron C.H. Schat, and E. Kevin Kelloway, “Workplace Aggression,” in Handbook of
Work Stress, eds. Julian Barling, E. Kevin Kelloway, and Michael R. Frone (Thousand Oaks, CA: Sage,
2005), 189-218. 331 Steven L. McShane and Mary Ann von Glinow, Organizational Behaviour: Emerging Realities for the
Workplace Revolution, 4th ed. (New York: McGraw-Hill, 2008), 213. 332 D’Cruz, Workplace Bullying in India, 11-12. 333 David Lyon, “National ID Cards: Crime-Control, Citizenship and Social Sorting,” Policing 1, no.1 (2007):
115.
Power Distance and Social Sorting
192
as well as surveillance and behavioural alterations. With respect to the IT/ITeS or BPO workplaces
in India specifically, and the ensuing recognition of perceived psycho-physical ‘torture’ and resultant
attitudinal and behavioural alterations, we are forced to compare the degree of surveillance in the
Indian organizational workplace today to the situation of the Roman slave ships, and regard it as a
modern form of digital slavery. This claim will be further explored as we consider the results analysis
of a brief survey conducted online for the purpose of this research with Indian IT/ITeS and BPO
employees. This study collected their real-time responses to electronic surveillance in their
workplaces from an employee perspective.
CHAPTER FIVE
A QUALITATIVE INSPECTION OF EMPLOYEE SURVEILLANCE IN INDIA
5.0 INTRODUCTION
Although workplace surveillance is a global phenomenon, not restricted to any particular
organization, sector, society, region, or country, it has boundless ramifications both at a micro-level
(motivation, competence, motivation) and a macro-level (organizations or sectors) on the cultural or
environmental backgrounds and contexts of a given time and space.1 As a part of this research, we
have conducted a qualitative study of electronic surveillance in the workplace in the Indian context.
We have done so because the literature on electronic surveillance in the Indian organizational
workplace is dominated by theoretical discussions with little empirical support, and especially little
testimony from employees’ perspectives or consideration of ethical frameworks. The study we here
present aims to fill this lacuna and contribute to broader scholarship on these matters. The socio-
cultural and economic backgrounds and present reality of IT, ITeS, and BPO affluence in Indian
workplace culture, which we have already discussed in the second chapter, makes clear the
significance and urgency of this. This enquiry falls within the scope of this research. The aim of this
study was to examine the impact on employees of the implementation of electronic monitoring
technologies and systems in the organizational workplaces. So, the overall objective of the study is
to discover, from employees’ perspectives, the adverse effects of electronic monitoring on their
attitude, job commitment and satisfaction, and morale and behaviour.
The study has been designed to either empirically confirm or disconfirm what we have been
exploring in previous chapters through literature studies. All participants in the study were subjected
to several surveillance practices in their present or previous workplaces, ranging from CCTV
cameras, e-mails and telephone monitoring, biometric identification, and control through GPS and
RFID. This range of exposure contributes to the validity and reliability of the study. The primary
research question around which this whole study revolves was this: as an employee, describe your
feelings about working under 24/7 electronic surveillance/monitoring at work. This was the
fundamental question directed in two samples (A & B) of study, to which additional information was
added concerning how this leads to further behavioural alterations. This chapter thus presents an
overview of employee perspectives in the Indian context, methodologically reviews literature to
substantiate employee experiences, and proposes a heuristic framework for organizing research on
employee reactions to electronic monitoring.
1 David E. Cantor, “Maximizing the Potential of Contemporary Workplace Monitoring: Techno-Cultural
Developments, Transactive Memory, and Management Planning,” Journal of Business Ethics Logistics 37,
no. 1 (2016): 18-25; Steve Lohr, “Unblinking Eyes Track Employees: Workplace Surveillance Sees Good
and Bad,” The New York Times, June 21, 2014, https://www.nytimes.com/2014/06/22/technology/workplace-
surveillance-sees-good-and-bad.html?_r=0 [accessed May 10, 2017]; Marko Pitesa, “Employee surveillance
and the modern workplace,” in Business Ethics: A Critical Approach: Integrating Ethics Across the Business
World, eds. Patrick O’Sullivan, Mark Esposito and Mar Smith (London: Routledge, 2012), 206-219; John
Weckert, Electronic Monitoring in the Workplace: Controversies and Solutions (Hershey: Idea Group
Publishing, 2005): David Lyon, Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination
(London: Routledge, 2003); David Lyon, Surveillance society: Monitoring everyday life (Buckingham:
McGraw-Hill Education, 2001); Jitendra M. Mishra and Suzanne M. Crapton, “Employee Monitoring:
Privacy in the Workplace?” S.A.M. Advanced Management Journal 63, no. 3 (1998): 4-11.
A Qualitative Inspection of Employee Surveillance in India
194
5.1 RESEARCH METHODOLOGY
As a systematic way of conducting a research, a methodology consists of “the principles and ideas
on which researchers base their procedures and strategies” (methods).2 A qualitative research
methodology is employed in this study with an aim to secure a comprehensive understanding of the
real-time experience of employees in the field.3 It is intended to be scientific, in that it “systematically
uses a predefined set of procedures to answer the question, collects evidences [and] is especially
effective in obtaining culturally specific information about the values, opinion, behaviours, and social
contexts of particular populations.”4 This qualitative research method, by emphasizing the natural
setting and real viewpoints of research participants, brings, as Norman K. Denzin and Yvonna S.
Lincoln describe, takes “an interpretive naturalistic approach to the world, [which] means that
qualitative researchers study things in their natural settings, attempting to make sense of or interpret
phenomena in terms of the meanings people bring to them.”5 It is exploratory in nature and tries to
unravel the underlying reasons and motivations of particular attitudinal and behavioural patterns
concerning a perceived issue.
Documenting the various methods used in a study enables the reader to better understand the
procedure and way in which the study developed and how it reaches its conclusions. Of the manifold
methods available in qualitative research, such as analytical induction6 and interpretive
phenomenological analysis7, this study takes phenomenography as its general-background approach,
both in its execution and description of the data collected. Phenomenography is a qualitative research
methodology emerged in early 1980s that explores the diverse ways in which different people
experience a reality differently or even contrarily. Though it was initially empirical in nature, its later
added theoretical or philosophical basis enabled it to apply rather extensive fields and disciplines
such as environmental management and workplace competence.8
This approach [phenomenography] has been described as “research which aims at description,
analysis, and understanding of experiences; that is, research which is directed towards experiential
2 Immy Holloway and Kathleen Galvin, Qualitative Research in Nursing and Healthcare, 4th ed. (West Sussex,
UK: Wiley, 2017), 21. 3 Since it is difficult to explain human experiences and behaviours in quantifiable or measurable terms,
researchers in the field of social sciences appropriately use qualitative methods to foster a deep and a
comprehensive understanding of things that occur in the social world. Beverley Hancock, Elizabeth Ockleford
and Kate Windridge, “An Introduction to Qualitative Research,” The NIHR RDS for the East Midlands /
Yorkshire & the Humber 2009 Qualitative Research (The NIHR RDS EM / YH, 2009), 4; Rosalind Edwards
and Janet Holland, What is Qualitative Interviewing? (London: Bloomsebury, 2013), 2-4; and Shoshanna
Sofaer, “Qualitative Research Methods,” International Journal for Quality in Health Care 14, no. 4 (2002):
329-336. 4 Natasha Mack, Cynthia Woodsong, Kathleen M. Macqueen, Greg Guest and Emily Namey, Qualitative
Research Methods: A Data Collector’s Field Guide (North Carolina: Family Health International, 2005), 1. 5 Norman K. Denzin and Yvonna S. Lincoln, eds., The SAGE Handbook of Qualitative Research, 4th ed. (Los
Angeles: Sage, 2011), 3. 6 Phil Johnson, “Analytic induction,” in Qualitative Methods and Analysis in Organizational Research: A
Practical Guide, eds. Gillian.Symon and Catherine Cassell (London: Sage, 1998), 28-50. 7 Jonathan A. Smith, “Beyond the Divide between Cognition and Discourse: Using Interpretative
Phenomenological Analysis in Health Psychology,” Psychology and Health 11, no. 2 (1996): 261-271. 8 Ference Marton, “Phenomenography: Describing Conceptions of The World Around Us,” Instructional
Science 10, (1981): 177-200; Ference Marton, “Phenomenography - A Research Approach to Investigating
Different Understandings of Reality,” Journal of Thought 21, no. 3 (1986): 28-49; Gerlese S. Akerlind,
“Variation and Commonality in Phenomenographic Research Methods,” Higher Education Research &
Development 31, no. 1 (2012): 115-127.
A Qualitative Inspection of Employee Surveillance in India
195
description.”9 By generally placing this phenomenographic approach within the scope of this study,
we aim to ensure that the personalized expression of employees’ real-time experiences of workplace
surveillance and the nuances of their insights are conveyed. Phenomenography is conceived, in this
study, more as an explorative approach10 than a methodology. For it also enables us to identify the
integral meaning of the phenomenon under discussion by contextually interpreting the collected data.
Phenomenography becomes significantly important within the scope of this research for three
reasons: first, due to its implications for the analysis of individual experiences about a social
phenomenon with the involvement in the day-to-day experiences and its added collective meaning-
seeking process; secondly, due to its foundational notion that “people collectively experience and
understand phenomena in a number of qualitatively different but interrelated ways;”11 and finally,
due to the inseparable relation it maintains between its research subjects (people experiencing the
phenomenon) and objects (the phenomenon under discussion).12 The relevant data on a particular
phenomenon obtained in semi-structured online survey (Sample A) and open-ended questionnaire
(Sample B) are described and analyzed using a phenomenographic approach. Following the
explanatory description of Gerlese S. Åkerlind on phenomenography, in this research, outcomes are
thematically categorized and analytically represented in what we call ‘categories of description.’13
This includes consideration of the structural relationships between the diverse ways in which research
subjects experience the same phenomenon.
Similarly, the reflexivity of this methodology is strictly maintained in this study. Reflexivity is
defined as “a process whereby researchers place themselves and their practices under scrutiny
acknowledging the ethical dilemmas that permeate the research process and impinge on the creation
of knowledge.”14 Some researchers claim that qualitative research says more about the subjectivity
of the researcher than about the subjects themselves.15 As Marilyn Lichtman writes, quoting
9 Ference Marton, “Phenomenography: Describing Conceptions of The World Around Us,” Instructional
Science 10, (1981): 180. Referring to Marton (1981,1986), Shahadat Hossain Khan describes
phenomenography as a “qualitative research approach that has been designed to find out peoples’ qualitatively
different experiences of the world in terms of categories of descriptions.” Shahadat Hossain Khan,
“Phenomenography: A Qualitative Research Methodology in Bangladesh,” International Journal on New
Trends in Education and Their Implications 5, no. 2 (2014): 34. 10 Alan Barnard, Heather McCosker and Rod Gerber, “Phenomenography: A Qualitative Research Approach
for Exploring Understanding in Health Care,” Qualitative Health Research 9, no. 2 (1999): 223. The goal of
this approach is “to identify a qualitative, non-dualistic research approach that identified and retained the
discourses of research participants and focused on people’s understanding of their experience of the world
around them.” Barnard, McCosker and Gerber, “Phenomenography,” 212. 11 Christine Yates, Helen Partridge and Christine Bruce, “Exploring Information Experiences through
Phenomenography,” Library and Information Research 36, no. 112 (2012): 97. See also, Marton,
“Phenomenography - A Research Approach to Investigating Different Understandings of Reality,” 28-49. 12 Yates, Partridge and Bruce, “Exploring Information Experiences through Phenomenography,” 98; John A.
Bowden, “The Nature of Phenomenographic Research,” in Phenomenography, eds. John A. Bowden and
Eleanor Walsh (Melbourne, Australia: RMIT University, 2000), 1-18; Louise Limberg, “Phenomenography:
A Relational Approach to Research on Information Needs, Seeking and Use,” The New Review of Information
Behaviour Research 1 (2000): 51-67. 13 Gerlese S. Åkerlind, “Variation and Commonality in Phenomenographic Research Methods,” Higher
Education Research and Development, 24, no. 4 (2005), 322. 14 Chi B. Anyansi-Archibong, Contemporary Issues Surrounding Ethical Research Methods and Practice
(Hershey, PA: IGI Global, 2015), 115. Originally in, McGraw, Lori, Anisa M. Zvonkovic, and Alexis J.
Walker, “Studying Postmodern Families: A Feminist Analysis of Ethical Tensions in Work and Family
Research.” Journal of Marriage and the Family 62, no. 1 (2000): 68-77. For further references, Paolo Mura,
“‘To participate or not to participate?’ A reflective account,” Current Issues in Tourism 18, no. 1 (2015): 83-
98. 15 Gavin B. Sullivan, “Reflexivity and Subjectivity in Qualitative Research: The Utility of a Wittgensteinian
Framework,” Forum Qualitative Sozialforschung 3, no. 3 (2002): 1-10.
A Qualitative Inspection of Employee Surveillance in India
196
Morwenna Griffiths, reflexivity is an “explicit self-consciousness about the researcher’s (or research
team’s, and/or the research funder’s) social, political and value positions, in relation to how these
might have influenced the design, execution and interpretation of the theory, data and conclusions.”16
Kirsti Malterud reflects in the same way, stating that, “[a] researcher's background and position will
affect what they choose to investigate, the angle of investigation, the methods judged most adequate
for this purpose, the findings considered most appropriate, and the framing and communication of
conclusions.”17 Therefore, personal bias, including a researcher’s own beliefs, values, backgrounds,
is sternly prevented from influencing this study. We have sought to be fully reflexive about ourselves
and what we are doing.
5.2 SAMPLE COLLECTION
In a research context, a population is defined as “the set of all units or individuals of interest to a
researcher,”18 while samples are described as “observed sets of measurements that are subsets of a
corresponding population.”19 Of the manifold forms of sample collection, such as surveys,
interviews, focus groups discussion, observation extraction, and secondary data sources, for the
purpose of this study we have used survey research. Survey research includes fixed sets of questions
to gather significant data on the subject under discussion.20 It is a specific type of field study that
involves the collection of data from a sample of elements intended to be “representative of a well-
defined, large, and geographically diverse population […] often, though not necessarily, through the
use of a questionnaire.”21 These types of field-experimental or non-experimental survey studies offer
insights able to improve the value of other, less empirical studies. Survey research literature thus
yields findings from subjects’ real-time experiences that engage a particular phenomenon.22 This
study makes use of this features of survey studies.
Data was collected in a two-way process: (1) a semi-structured online survey (Sample A); and (2) a
narrative inquiry (Sample B). A semi-structured interview method was selected, as it, firstly, “allows
depth to be achieved by providing the opportunity on the part of the interviewer to probe and expand
16 Marilyn Lichtman, Qualitative Research for the Social Sciences (Thousand Oaks, CA: Sage Publications,
2014), 33. Originally in, Morwenna Griffiths, “Critical Approaches in Qualitative Educational Research: The
Relation of Some Theoretical and Methodological Approaches to these Issues,” Edinburgh Research
Explorer (2009), 17 Kirsti Malterud, “Qualitative Research: Standards, Challenges and Guidelines,” The Lancet 358 (2001): 483-
484. 18 Larry Winner, “Applied Statistical Methods,” University of Florida, Lecture Notes, 2009, 7.
http://www.stat.ufl.edu/~winner/statnotescomp/appstat.pdf [accessed May 20, 2016]. 19 Winner, “Applied Statistical Methods,” 8. The population is all the individuals in whom a researcher is
interested. Besides individuals, it can also be other units such as geographical areas or a particular group of
institutions, etc. For instance, cities with populations of 10,000 or more or all households in a particular area,
etc. are counted as population in a research context. In the data used in this study the population consists of
individuals who are working in organizational workplaces such as IT, ITeS, BPOs, etc. A sample, in this
regard, is the subset or part of the population involved in the study. The process of sample selection for
particular interests of the study is called sampling. Social Science Research & Instructional Center, Survey
Research Design and Quantitative Methods of Analysis for Cross-sectional Data, California State University,
15 August 1998, http://www.ssric.org/trd/modules/cowi/chapter3 [accessed May 15, 2017]. 20 Margaret C. Harrell and Melissa A. Bradley, Data Collection Methods: Semi-Structured Interviews and
Focus Groups (Santa Monica, CA: Rand Corporation, 2009), 6. 21 Jon A. Krosnick, Paul J. Lavrakas and Nuri Kim, “Survey Research,” in Handbook of Research Methods in
Social and Personality Psychology, 2nd ed., eds. Harry, T. Reis, Charles M. Judd, 404-443 (New York:
Cambridge University Press, 2014), 406. 22 Krosnick, Lavrakas and Kim, “Survey Research,” 404.
A Qualitative Inspection of Employee Surveillance in India
197
the interviewee's responses.”23 Secondly, in this method, researchers can use a basic checklist, which
“allows for in-depth probing while permitting the interviewer to keep the interview within the
parameters traced out by the aim of the study.”24 This type of interviewing method is significant also
because it allows the researcher to cover various issues related to the subject matter. Narrative inquiry
is a part of qualitative research methods in the form of unstructured but in-depth interviews with
specific objectives and features.25
The features of this method “emerge from the life stories of both the respondent and cross-examined
the situational context.”26 The researcher’s influence on the informants or the event is very minimal
and thus the informant alone reconstructs the social event and the “here” and “now” of the situation
in a spontaneous language. Besides, narrative response-seeking and data collection is important in
qualitative research as it seems to be the best way to transmit the experience or communicate
meaningful content.27 Therefore, narrative analysis enables the researcher to achieve a deeper
understanding of the many ways and means that both an individual and group of individuals organize
and derive meaning from an event.28 This method is particularly useful in this research, as it studies
the impact of various social structures and institutional practices on individuals’ identities, relations,
and families.
This two-way process is employed also because many of the contacted employees expressed
discomfort responding to a structured online survey due, which they found to be inconvenient. This
seems to derive from a feeling that others will be made critically aware of them. They expressed
discontent and a fear of getting caught speaking against their company. At the same time, they were
ready to respond to this challenge via private networking tools such as WhatsApp, Messenger, etc.,
as a causal chat/dialogue. There arose a need to collect and include brief narrative responses to the
study, which assures that a more integrated and comprehensive view of employees’s experiences will
be recorded and that their actual feelings will be expressed. So, a majority of employees were asked
to complete the online semi-structured survey (Sample A), and the rest could respond to a question
in a narrative form (Sample B). In pictures 1 & 2, we find examples of the responses several
participants sent back to the collector, either individually or collectively via a social network in the
form of casual chatting.
23 Herbert J. Rubin and Irene S. Rubin, Qualitative Interviewing: The Art of Hearing Data, 2nd ed. (Thousand
Oaks, CA: SAGE Publications, 2005), 88. 24 Bruce L. Berg, Qualitative Research Methods for the Social Sciences (London: Pearson, 2007), 39. 25 Catherine Kohler Riessman, Narrative Analysis (Newbury Park: Sage Publications, 1993), 2-16; D. Jean
Clandinin and F. Michael Connelly, Narrative Inquiry: Experience and Story in Qualitative Research (San
Francisco: Jossey-Bass Publishers, 2000), 98-115; Snowden, David. “Naturalizing Sensemaking” In
Informed by Knowledge: Expert Performance in Complex situations, eds. Kathleen L. Mosier and Ute M.
Fischer (New York: Psychology Press, 2010), 223-234. 26 Camila Junqueira Muylaert et al., “Narrative Interviews: An Important Resources in Qualitative Research,”
Revista da Escola de Enfermagem da USP 48, no. 2 (2014): 185. 27 Muylaert et al., “Narrative Interviews: An Important Resources in Qualitative Research,” 185. 28 Donald Polkinghorne, “Narrative Configuration in Qualitative Analysis,” Qualitative Studies in Education 8,
no. 1 (1995): 5-23.
A Qualitative Inspection of Employee Surveillance in India
198
Picture 1 Individual Response
Picture 2 Collective Response
The semi-structured survey (Sample A) attempts to measure the real feelings and responses of
employees working under severe monitoring. A rigorous analysis is performed of the responses to
explore and examine various parameters that affect employee performance and life chances under
these conditions. The narrative (unstructured) online interviews (Sample B) were conducted with
both male and female graduate professional techies (IT professionals) employed in different
A Qualitative Inspection of Employee Surveillance in India
199
capacities, from business executives to administrators, with both domestic and international IT
companies situated in India. Data was collected from online open-ended question-responses on a
specific question. Table 1 shows the application of methodology and different approaches employed
in this research.
Particulars Sample A Sample B
Types of Research Empirical Research (Qualitative) Empirical Research (Qualitative)
Sample Size 118 34
Sample Unit Employees of IT, ITeS. BPOs and other
Business Organizations
Employees of IT, ITeS. BPOs and other
Business Organizations
Survey Method An online semi-structured
questionnaire through emails and
weblinks (Survey Monkey).
An online narrative response collection
through emails, social networks.
Analysing Tool Microsoft Excel 2010 NVivo, Microsoft Excel 2010
Analysing Method Phenomenography Phenomenography
Table 1 Methodology and Approaches
For this study, data were collected from business executives and IT professionals employed at several
organizations across India. Among them, employees belonged to the IT, ITeS, BPO sectors in South
India and included various tenants in the Infopark (Tata Consultancy Services (TCS), Wipro, UST
Global, EXL Services, etc.), Kochi, Kerala; in the Technopark (Infosys Limited),
Thiruvananthapuram, Kerala; and in the International Tech Park (Accenture Services Pvt. Ltd.),
Bangalore, Karnataka. It was decided to focus on these three sites to secure more concentration,
precision and accuracy. This approach also circumvents the problems that may arise from
randomized response collection. Other respondents were from the randomly selected organizations
(TCS, Wipro, WNS, Samsung, AXA, Infosys, HSBC, HCL Technologies, Zenta, Cognizant,
Accenture, IBM, etc.) among the broad range of companies in various parts of India. To enable
employees to freely express their real experiences and feelings about the subject matter without any
hindrances (job security, fear of firing from the authority, etc.), participants were contacted
individually and directly, without consulting the organizations that employ them. In the following, a
detailed analysis of the data collected is provided.
5.3 RESULT SECTION (DATA ANALYSIS)
The main purpose of a result analysis is to present the findings of a study.29 On agreeing to carry out
this research, a total of approximately 200 employees were given the survey questionnaire online. Of
these, a total of 152 usable responses (76.0% response rate) were collected in two forms (Samples A
& B). Of the 118 participants (77.6%) in sample A, 68 were male (57.63%) and 50 female (42.37%),
whereas among the 34 respondents (22.4%) in sample B, 17 each were male and female, comprising
50% each.
5.3.1 Result Analysis - Sample A
The pie charts and bar charts below offer a graphical representation of the data collected from the
random people working in various IT and business firms in India. The total number of respondents
29 Amit Kaura, Evidence-Based Medicine: Reading and Writing Medical Papers (Edinburgh: Mosby Elsevier,
2013), 62.
A Qualitative Inspection of Employee Surveillance in India
200
was 118, ranging between 22-36 years of age. Of these, 57.63% were male (68 in number) and
42.37% female (50 in number), as shown in figure 1.
Figure 1 Gender
The second question concerned the presence of ubiquitous surveillance or monitoring practices
within the workplace. From the data analysis, of the 114 people who answered this question, 88.6%
agreed that their company uses ubiquitous electronic monitoring/surveillance at work (CCTV
cameras, phone, computer and internet monitoring, GPS, RFID, etc.), whereas a minor percentage
(11.4%) stated that their company doesn’t use them at all. Four participants skipped this question.
Figure 2 depicts this data.
Figure 2 Use of Electronic Surveillance
The third question was formulated with multiple choice answers, where respondents could choose
one or more answers about the described variables (data items). These variables or data items were
added to the questionnaire according to their rank, both about the positive and negative sides of the
scenario, as determined by analysis of relevant literature on the subject. The data show various
viewpoints of working under 24/7 electronic surveillance in the workplace. Of the 118 respondents,
6 people skipped this question. 112 people answered it, of which almost 50 (44.6%) agreed that it
ensures security. At the same time, 91 respondents, including the few who speak about security,
expressed concern that it compromises privacy at work (42.0%) and restricts freedom and autonomy
(39.3%). 44 people, or 39.3% of the respondents, stated that this adversely affects their work
efficiency and leads them to feel they are not trusted or valued. See Figure 3 a depiction of this data.
57.6%
42.4%
Gender
Male
Female
Gender Answer
Options
Response
Percent
Response
Count Male 57.6% 68 Female 42.4% 50 answered question 118 skipped question 0
Answer Options Response
Percent
Response
Count
Yes 88.6% 101
No 11.4% 13
answered question 114
skipped question 4
88.6%
11.4%
Does your company use ubiquitous
electronic monitoring/surveillance (CCTV
cameras, Phone, computer and Internet
Monitoring, GPS, RFID, etc.) at work?
Yes No
A Qualitative Inspection of Employee Surveillance in India
201
How do you feel working under 24/7 electronic surveillance in your work place? [multiple
choice]
Answer Options Response
Percent
Response
Count
I don't bother about it 31.3% 35
It ensures security 44.6% 50
It increases my productivity 11.6% 13
I feel responsible at work 13.4% 15
I feel completely uncomfortable and thus job dissatisfaction 29.5% 33
I feel no freedom and autonomy 39.3% 44
I feel lack of privacy at work 42.0% 47
I feel dehumanizing and loss of my human dignity 19.6% 22
I feel stress, and too much tensed and worrying 36.6% 41
I feel not being trusted and valued 39.3% 44
I feel like being subjugated to a dominating other 16.1% 18
I become over-conscious leading to behavioral alterations 14.3% 16
Other 8.0% 9
answered question 112
skipped question 6
Figure 3 Employees Responses 1
The percentage of people who reported experiencing physical and mental stress was almost equal to
that of those who feel mistrusted. It covers 41 respondents in number, or 36.6%. About 33 (29.5%)
stated that they experience unease and dissatisfaction at work, whereas another almost equal
percentage (31.3%) say they are not bothered at all about the surveillance. A certain percentage
(19.6%) stated that surveillance has a dehumanizing effect and disrespects their human dignity, and
that they are being subjugated and dominated by a higher official (16.1%). This can generate an
excessive consciousness about one’s work and lead to several behavioural alterations (14.3%).
From all these viewpoints, the most interesting point is perhaps that only a minor percentage (25.0%)
stated that surveillance increases their productivity (11.6%) or helps them to be responsible at work
31.3%
44.6%
11.6%
13.4%
29.5%
39.3%42.0%
19.6%
36.6%
39.3%
16.1%
14.3% 8.0%
How do you feel working under 24/7 electronic surveillance in your workplace?
[multiple choice]
I don't bother about it
It ensures security
It increases my productivity
I feel responsible at work
I feel completely uncomfortable and thus job
dissatisfactionI feel no freedom and autonomy
I feel lack of privacy at work
I feel dehumanizing and loss of my human dignity
I feel stress, and too much tensed and worrying
I feel not being trusted and valued
I feel like being subjugated to a dominating other
I become over-conscious leading to behavioral
alterationsOther
A Qualitative Inspection of Employee Surveillance in India
202
(13.4%). A few of the comments collected from the narrative boxes of the questionnaire, which
allowed participants to freely jot down their opinions, are given in the Table 2. These highlight
several issues in particular, including issues of gender discrimination, lack of individual trust,
freedom and innovation, health hazards, and the possibility of manipulative and aggressive
behaviour.
No. Commends
1 I feel like women are more affected with it.
2 It is just to show that employees are always under a surveillance gaze and that limit our freedom
and innovation.
3 Individuals responsibility is not considered worth praising.
4 It is something like spying and feel exhausted and not being trusted.
5 Discrimination due to known data.
6 CCTV kept at my work place is used by securities to ensure safety, I don’t think managers or
higher officials are using it for checking on our way of working or to monitor on us. Managers
are always with us as a helping hand sitting in our nearby cubicles.
7 It also affects my health and diminishes my self-confidence.
8 It leads to exhaustion and aggressive behaviours.
9 It makes me to behave not in my natural way, but for the desired interest of my supervisor.
Table 2 Narrative Comments 1
Of the total participants, 106 (89.83%) responded to the fourth question dealing with behavioural
tendencies that develop, directly or indirectly, due to the ubiquitous surveillance practices. As figure
5 shows, 12 people skipped this question. Among respondents, 52.8% stated that surveillance makes
them less likely to engage in risky behaviour. A certain percentage (42.5%) stated that they make use
of unobserved spaces for private activities. Several of the respondents (46.2%) were concerned about
being categorized and being an object of suspicion. Many held that this ultimately leads to attitudinal
and behavioural deviances such as intentional absenteeism (35.8%) and encourages aggressive
behaviours and occupational violence (33.3%).
Furthermore, many held that this leads to favoritism and preference towards the few with vested
interests (21.7%). The effects of this unwanted surveillance and the stress it creates also adversely
affects employees’ marital relationships (22.6%). Finally, of the three participant who chose to
respond to the option ‘other,’ one said that “it [surveillance] makes me to behave not in my natural
way, but for the desired interest of my supervisor” while other two simply filled “No” and “NA”
respectively.
A Qualitative Inspection of Employee Surveillance in India
203
Does surveillance lead to further behavioural tendencies like: [multiple choice]
Answer Options Response
Percent Response Count
fostering favorable behaviors 21.7% 23
reducing risky actions and performance 52.8% 56
making use of unobserved spaces 42.5% 45
increasing partiality, favoritism, etc. from the authority 32.1% 34
being categorized with suspicion 46.2% 49
(stress) leading to deviance such as intentional absenteeism, etc. 35.8% 38
(stress) affecting family life, marital relationships 22.6% 24
(stress) leading to aggressive behaviors and occupational violence 33.0% 35
Other 2.8% 3
answered question 106
skipped question 12
Figure 5 Employees Responses 2
The fifth question addressed the willingness of employees to work under ubiquitous surveillance. Of
the 118 participants, 108 responded (91.6%), while 10 (8.4%) skipped this question. The data
analysis (Figure 6, A & B) explicates that 75.9% of respondents prefer to work without being
monitored. The other 24.1% prefers various surveillance systems to be used in the workplace. Table
3 shows the comments, both positive and negative, by participants (14.8%) who responded to the
narrative choice of this question.
0
10
20
30
40
50
60
21.7
52.83
42.5
32.1
46.2
35.8
22.6
33
2.8
Does surveillance lead to further behavioural tendencies like: [multiple
choice]
A Qualitative Inspection of Employee Surveillance in India
204
Figure 6 Employee Responses 3
No. Narrative Responses
1 It makes me uncomfortable and makes me not to take any risk at work.
2 A person's productivity and talent can be moulded and used effectively only under proper monitoring
and surveillance.
3 Yes or no it doesn't bother me a lot. Work is work. May its strange.
4 It is good in a responsible work environment. Most of the times I don't care much about it, for me it
makes no difference whether if it is under electronic surveillance or not.
5 For security. Security compromise other uncomfortable.
6 It leads to stress.
7 Ensures safety.
8 NA - It doesn't affect my work.
9 Yes, it helps in ensuring the security of employees for critical and unforeseen incidents.
10 Its bring awareness to an employee that what he is doing is looking by the client and can cause
problem to Job, if it is not right.
11 I actually don’t bother having it at my workplace, as long as it is used mostly for security.
12 NA
13 Just for Security Purpose.
14 It is a good measure for security.
15 It takes away my work satisfaction.
16 I am not a slave to work like this.
Table 3 Narrative Comments 2
The sixth question was designed to understand the aspect of individual ability to take responsibility
for one’s actions without the force or constraint of an external monitoring system. Of the 114 people
(96.6%) who responded to this question (4 people skipped it), the highest percentage (98.2%)
confirmed that they are and will be responsible at work without being monitored electronically, while
very minimal respondents (1.8%) said ‘No’ to this (Figure 7). Nine participants commented on this
question in a narrative form, as recounted in Table 4. Those who in favor of monitoring identify
security reasons as their primary concern. Others cite the need for a strong work ethic, consisting of
dedication, responsibility and a commitment to one’s work.
24.1%
75.9%
Do you want to work being under
ubiquitous electronic surveillance?
Yes
No
Answer
Options
Response
Percent
Response
Count
Yes 24.1% 26
No 75.9% 82
Why? 16
answered question 108
skipped question 10
A Qualitative Inspection of Employee Surveillance in India
205
Figure 7 Employee Responses 4
No. Narrative Responses
1 Because I am confidant and responsible.
2 I feel I have the dedication and commitment towards the work which I'm doing. My responsibility
does not change according to the level of external monitoring.
3 I feel more comfortable.
4 Of course, each person will have to finish the work assigned to them in the specific period of time.
If he or she is a responsible person they will do their best to complete it on time.
5 Because we have deadlines.
6 It really depends on the work ethic.
7 I am sure that in order to be productive and responsible I do not need an external monitoring
8 NA
9 But need to be monitored for security purpose and even to find the lost thing.
Table 4 Narrative Comments 3
The final question was designed to identify employee preferences concerning monitoring practices
in their organization. They could opt for multiple choices. Out of 114 (96.6%) respondents, 86
(75.4%) preferred self-monitoring to external monitoring (22.8%) or no electronic monitoring
systems (37.7%). A small percent expressed indifference to the question, either by choosing the
option ‘none of above’ (1.8%) or by skipping the question (3.4%). See the depiction of this data in
figure 8.
Figure 8 Employee Preference
98.2%
1.8%
Will you be responsible at work
without external monitoring?
Yes
No
22.8%
37.7%75.4%
1.8%
What do you prefer, if at all given a
chance, as a feasible choice in your
organization?
Yes, electronic monitoring
No electronic monitoring
Prefer Self-monitoring
None of above
Answer
Options
Response
Percent
Response
Count
Yes 98.2% 112
No 1.8% 2
Why? 9
answered question 114
skipped question 4
Answer
Options
Response
Percent
Response
Count
Yes, electronic
monitoring 22.8% 26
No electronic
monitoring 37.7% 43
Prefer Self-
monitoring 75.4% 86
None of above 1.8% 2
answered question 114
skipped question 4
A Qualitative Inspection of Employee Surveillance in India
206
The results here show that most respondents prefer self-monitoring. Besides, along with those argued
for ‘no electronic monitoring,’ a few of those who acknowledged a need for electronic monitoring
also prefer self-monitoring as the next best option. We may now turn to the results of Sample B.
5.3.2 Result Analysis - Sample B
The result of the narrative interview (open-ended questionnaire) is given in the following. A total of
34 people responded in this form of sample collection, consisting 22.4% of all respondents. The
ratio of male to female respondents in this sample is similar - 50.0% (Figure 9).
Figure 9 Gender
All responses (sample B), both individual and collective, are combined by the researcher and given
here in Table 5 for the purpose of analysis. Square brackets in the text are the researcher’s own
addition and meant to clarify the presentation of these responses.
Employee Employee Concerns Gender
1 CCTV monitoring is kind of good for monitoring staffs when the
BOSS [higher authorities] is out of town or physically absent in
office. It is a good measure for security. Sometimes it’s really
irritating, staffs mend to hide their faces and work. Privacy is getting
monitored.
Female
2 I feel being spied on and untrusted and [I] loses trust to the
management. It takes away my privacy and work-satisfaction. I am
not a slave to work like this. It also affects my health and diminishes
my self-confidence.
Female
3 I feel always being looked with suspicion and is stressful. I change
my behaviour to please the authority. Feeling exhausted, think to
quit the job.
Male
4 In a professional environment where everyone’s Key Result Area30
is defined and the individual is responsible & accountable, its
unprofessional to have electronic surveillance at work. All
individuals are different and there way of working is also different.
Hence every action of employee shouldn’t be traced & tracked. Most
of the companies use monitoring at work just to stop the unethical
practices or harassment against the women employees for the
Male
30 Key Result Area is generally referred to parameters that any organization fixes for a specific role or job
profile of the employees to have better clarity and experience of their roles. Brian Tracy defines it as “those
things that you absolutely, positively must do to fulfill your responsibilities and achieve your business goals.”
Brian Tracy, “Determine Your Key Result Areas,” American Management Association,
http://www.amanet.org/training/articles/determine-your-key-result-areas.aspx [accessed May 15, 2017]. It
allows to achieve set objectives and goals.
50.0%50.0%
Gender
Male
Female
Gender
Answer
Options
Response
Percent
Response
Count
Male 50.0% 17
Female 50.0% 17
Total Respondents 34
A Qualitative Inspection of Employee Surveillance in India
207
security purpose. In the recent past, it was in news companies track
the Idle time of systems to capture employees work, as an employee
it just breaks the trust on employee on the employer/company. The
employee attrition will be more in those kinds of employees.
5 I actually don’t bother having it at my workplace, as long as it is used
mostly for security. But to be productive, no need of monitoring, but
is need for security purpose and even to find the lost thing.
Male
6 Our personal privacy is sometimes compromised, when we are
aware that, we are being monitored then we tend to be more
conscious unsettled.
Male
7 It is important to consider employee rights and the risks involved.
Although the use of CCTV has its advantages, it can be very time-
consuming dealing with employee complaints and ICO
[The Information Commissioner's Office] investigations. It can also
lead to reputational damage and mean that employers are prevented
from relying on data which would otherwise have been very useful
to them.
Male
8 Fear of being on camera – much like public speaking, as soon as we
step in front of the camera, our knees and hands start to tremble, our
voice get soft, it feels like someone looking straight into your eyes
and judging you.
Male
9 CCTV ensures security. Also sees to it that people follow the rules
and agreement as agreed upon with the clients. Thus, increases the
trust of Clients in the organization resulting in company’s and in turn
employer benefit.
Female
10 CCTV at time makes it uncomfortable to work as there is always a
feeling that someone is monitoring every action of the employees
which at times can create feeling of interference in their personal
space.
Female
11 I feel it is good. If in case of any problems tracking becomes easy. I
actually don’t bother having it at my workplace, as long as it is used
mostly for security.
Male
12 No use of CCTV. Most of the cameras won’t work under odc31
[Open Data Commons]. No one monitors even. It’s there just for
formality.
Female
13 Please don’t even ask about CCTV modern slaverism. Female
14 It is good in a responsible work environment. Most of the times I
don't care much about it, for me it makes no difference whether if it
is under electronic surveillance or not.
Male
15 CCTV is one way of monitoring that helps in keeping an eye on the
physical activities of an employee in the area under surveillance. It
is very useful by making people feel safe but in case of CCTVs
specifically, the manipulation of video that is proof of monitoring is
possible in some worst situations that can decrease the reliability in
it.
Male
31 Open Data Commons (ODC) is the home of a set of legal tools to help you provide and use Open Data. It
was initially a project of the Open Knowledge Foundation (OKF), Cambridge, UK. Dealing with the legal
questions on open data or on databases, ODC provides licensing agreements (developed in 2009) to it, which
enables individuals and or organizations to make their data legally open. Open Knowledge Foundation, “Open
Data Commons: Legal Tools for Open Data,” https://opendatacommons.org/ [accessed May 15, 2017]; Paul
Miller, Rob Styles and Tom Heath, “Open Data Commons, A License for Open Data,” http://ceur-ws.org/Vol-
369/paper08.pdf [accessed May 15, 2017]; and, Primavera De Filippi and Lionel Maurel, “The Paradoxes of
Open Data and How to Get Rid of It? Analyzing the Interplay between Open Data and Sui-Generis Rights on
Databases,” International Journal of Law and Information Technology 23 (2015): 16.
A Qualitative Inspection of Employee Surveillance in India
208
16 With development in technology we can monitor through videos or
by keeping track of activities that uses the network under
surveillance; thus, it can be achieved through omni-channel32
[multiple channels].
Male
17 Monitoring, though helpful in many ways, as it protects company
assets and fosters efficient use of worktime, it leads to increase in
initial expense with extra maintenance costs.
Female
18 In IT industries, another way of surveillance in keeping track of
activities that they perform in the system allotted to them which is
done by monitoring the processes, transactions and searches
performed in the company's network that can increase the
productivity.
Male
19 Monitoring can make a worker more productive on the job by cutting
down on the amount of mistakes made while also allowing for
greater, efficient use of one's time. In addition, the practice could
make the workplace safer.
Male
20 Its bring awareness to an employee that what he is doing is looking
by the client and can cause problem to Job, if it is not right.
Male
21 It limits my freedom, when there is no freedom there is no creativity.
we are not robots to monitor all-time during the work. It makes me
exhausted at work and feel the same when I am back home.
Female
22 Do they not trust us? Surveillance inhibits freedom at work. The
more we are restricted the more rage with others we become.
Female
23 It breeds constraints of automatic self-disclosure (all my moves are
watched and recorded) leading to further behavioural and
performative damages.
Female
24 It reduces the freedom to work freely and reduce creativity. It gives
excessive pressure at work and is a violation of my privacy.
Male
25 Am I a prisoner to be always watched over? Workplace should not
be equated with prisons. Why should a stranger observe women’s
privacy in the name of surveillance?
Female
26 I feel the element of distrust is the key here. It also leads to the
creation of artificial professional behaviour. It is the indication from
the management that they do suspect us.
Female
27 Now, it goes beyond performance evaluation and intrude our privacy
and restrict the freedom It is used because, with a fear tactic, the
management wants to get full control over us. For me it creates an
atmosphere of mistrust at work.
Female
28 For the management, it may act as a moral check on the employees,
but I am too much stressed and feel very uncomfortable to work
being under monitoring. Not allowing us to have or enjoy a bit of
Female
32 Omni-channel is a cross-channel business model, a concept of complete integration of all channels, business
functions and across all products and services and is perceived as an extension of multi-channel approach.
Though it is used mainly to increase customer experiences and satisfaction, it serves in various denominations
like financial services, healthcare services, telecommunications, webpages and social media, etc. Donald
Carroll and Inés Guzmán, “The New Omni-Channel Approach to Serving Customers: Strategy Implications
for Communications Service Providers,” Accenture 2015. https://www.accenture.com/be-
en/~/media/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Industries_2/accenture-new-
omni-channel-approach-serving-customers.pdf [accessed May 15, 2017]; Tom Wasserman, “Creating a
Seamless Omni-Channel Customer Experience,” Mobile Business Insights, December 30, 2015.
http://mobilebusinessinsights.com/2015/12/creating-a-seamless-omni-channel-customer-experience/
[accessed May 15, 2017]; and, Nicole Fallon, “The New Customer Service Is Here, There & Everywhere,”
Business News Daily, August 6, 2014, http://www.businessnewsdaily.com/6927-omnichannel-customer-
service.html [accessed May 15, 2017].
A Qualitative Inspection of Employee Surveillance in India
209
own space is like a crime done to our human self and shows the lack
of respect to our needs and wants.
29 The privacy will be lost in work premises as the surveillance cameras
are placed at various locations inside the work place. On the other
hand, the well talented information technical persons can also work
in the systems without even getting caught by the surveillance
cameras.
Male
30 The surveillance cameras can only be acceptable at the main
entrance gate, check in point etc., where there is required a lot of
surveillance for the protection purposes. There are various private
and total personal things that cannot be make publicized.
Surveillance at all corners of the workplace is assumed to be
insulting the personal human dignity.
Female
31 Apart from the industrial and personal issues, there is also a primary
issue to be concerned, the health. The surveillance cameras which is
an electronic device and possess some minor radiation emission.
Though these radiations are emitting in negligible amount, the long-
term exposure of these radiation can cause serious health problems
(eye damage, skin damage, etc.) in humans.
Male
32 We work hard when situation demands it, but will never otherwise.
So, it is good to have control over employees through these types of
monitoring means and measures. But, employees should not be
misunderstood and wrongly judged through external monitoring
without knowing the actuality of a particular action.
Female
33 It helps the management to know how faithfully the employees
spend the work time and accordingly measure the employee
productivity and take other decisions. So, let us say, it in fact prevent
illegal activities at work.
Male
34 It is implemented as part of security, but I feel insecure working
under it, and it also restricts my freedom and privacy. Now-a-days,
monitoring is on ourselves [employees], not on our work or
performance.
Female
Table 5 Narrative Responses
Of the 34 participants in Sample B, 12 (35.3%) responded positively to workplace surveillance, citing
mostly reasons related to security (1, 4, 5, 15, 19, 30, 34); the need to maintain rules and norms (9,
28,32); then need to increase productivity (18); and its ability to serve as a good substitute for one’s
supervisor (1). A few of the respondents were not bothered about surveillance, so long as it leads to
security (5, 11, 14). However, along with these positive responses, several expressed concerns about
privacy invasion (1); a resultant lack of freedom (34), trust (4), self-responsibility (5); the possibility
that data such as CCTV footage and other personal and work life details might be manipulated (15);
and increased stress (28) and health issues (11). The other 22 respondants (64.7%) were entirely
negative or sceptical about the intentions of the surveillance systems used in their workplaces.
The more recurrent issues expressed by employees related to privacy (1,2,6,24,25,27,29,30,34),
freedom (21,22,24,27,34) and a lack of trust (2,4,22,26,27). A few of the respondents were concerned
about health-related hazards (2,31), as they reported feeling more stressed (3,6,24,28) and exhausted
(3) in highly monitored work situations. This in turn generated a fear of the camera (8,27). They
expressed doubt about the effectiveness of the fear tactics used by their employers (27), who spy on
employees (2) with suspicion (3,26). This made them feel as though they were being treated as robots
(24) and prisoners (25) and reduced their self-confidence (2). Moreover, surveillance was perceived
as a form of modern slavery (2,13) and thought to increase attrition and absenteeism (3,4).
A Qualitative Inspection of Employee Surveillance in India
210
Other important and often neglected views are related to the behavioural alterations caused by
workplace surveillance. Employees tend to hide their faces from CCTV cameras (1) and try to
express themselves in a way that satisfies the desires and interests of the authorities (3), thus creating
an artificial professional behaviour (26). Technically talented and trained persons, they reported, can
escape being caught (29). There is an increasing view that it is unprofessional to employ means of
surveillance that disregard individual differences (4) and that there is no need for external monitoring
to ensure productivity (5). It has become important to consider the risks and rights of both employer
and employee (7), but interferes with ‘personal space’ (10) in each situation. Several respondents
stated that this is just for the sake of formality and that they do not work under open data commons
(12). Also, that it increases initial expenses and creates extra maintenance costs (17). Though
employees sometimes accept monitoring for security reasons, therefore, it nonetheless leaves them
feeling insecure, since monitoring is now focused on employees themselves more than on their work
or performance (34). Thus, employees feel a lack of respect toward their needs and wants as human
beings (28) and perceive surveillance as an insult to their human dignity (30). The more restricted
the workplace setting, one respondant stated, the more rage toward others one will feel (22). All these
experiences, views and observations of employees must of course be examined in detail in order to
derive a conclusive result and identify its ethical implications.
5.4 DISCUSSION OF THE RESULTS [SAMPLES A & B]
The purpose and objective of this discussion section is to provide an interpretation of the study results
and substantiate these with evidence from the literature to derive accurate conclusions.33 We will
identify the theoretical and pedagogical implications of these results in appropriate depth by
answering the research question and critically evaluating the study. Therefore, in this section, we
first comment on the results, interpreting what they mean in the larger context of this research,
explain unexpected results, if any, and then review the findings in the context of existing literature
about our subject.34 Secondly, in a more descriptive fashion, we place this study in the context of a
current and ongoing academic and disciplinary conversations on these matters. The second chapter
of this research has explored the gradual evolution of Indian work culture and workplace processes
from the pre-colonial period to the present. As Pascale Carayon concludes in his research,35 along
with above mentioned factors, the particularities of job demands, job control, and social support all
do much to influence and stimulate employee reactions to it. In addition, the frequency of monitoring
also impacts employee reactions.36 Overall, the results of employee responses, within the scope of
this study, provide a partial support for the socio-ethical concerns already described through the
various literature reviews and discourse analyses we have provided. This makes clear that, along
with organizational contexts with their policies and procedures, other socio-cultural and economic
features and contexts also influence the practice of electronic monitoring and employee reactions to
it. Employees view the workplace as a symbol of their life and as corresponding to the whole of their
33 Kaura, Evidence-Based Medicine: Reading and Writing Medical Papers, 62. 34 Peggie P.K. Chan, “Reporting Research Findings,” in Communicating in the University Culture, eds. T.
Ruanni F. Tupas, Catherine Cook and Norhayati Bte Mohd Ismail (Singapore: NUS, 2009), 27-33. 35 Pascale Carayon, “Effects of Electronic Performance Monitoring on Job Design and Worker Stress: Results
of Two Studies,” International Journal of Human–Computer Interaction 6, no. 2 (1994): 177–190; Pascale
Carayon, “Effects of Electronic Performance Monitoring on Job Design and Worker Stress: Review of the
Literature and Conceptual Model,” Human Factors: The Journal of the Human Factors and Ergonomics
Society 35, no. 3 (1993): 385–395. 36 Brian P. Niehoff, and Robert H. Moorman, “Justice as a Mediator of the Relationship between Methods of
Monitoring and Organizational Citizenship Behavior,” The Academy of Management Journal 36, no. 3
(1993): 527–556.
A Qualitative Inspection of Employee Surveillance in India
211
life-activities and life-chances. Therefore, it is very important that work engagement and work
satisfaction should respond to the unique identities of employees.
5.4.1 The Scope of the Phenomenographic Approach
Phenomenography ultimately “aims at description, analysis and understanding of experiences.”37 It
aims to describe people’s experience of a phenomenon and to provide the researcher with “content-
oriented and interpretative descriptions of the qualitatively different ways in which people perceive
and understand their reality.”38 The most significant and distinctive feature of this approach is its
“[focus] on the apprehended (experienced, conceptualized) content as a point of departure for
carrying out research and as a basis for integrating the findings.”39 This phenomenographic approach,
therefore, is distinctive in the context of the qualitative research tradition to the extent that “it
identifies similarities and differences in the way we experience and understand phenomena in the
world around us.”40 It follows that in workplace-monitoring research, it is important to recognize and
explore the qualitatively diverse ways a phenomenon is experienced and understood by employees.
Central to improving employee satisfaction and thus increasing productivity is identifying the ways
in which the same phenomenon is captured by them. Especially significant for our current research
is the fact that phenomenography goes beyond individual experiences, emphasizing the collective
meaning of experiences.41 Finally, besides its focus on the experiential, conceptual and lived realm,
phenomenography also deals with what is individually developed and culturally learned.42
In addition to this, Ference Marton draws a useful distinction between different kinds of research
approaches. He speaks of a conventional, ‘first-order’ perspective, where the researcher looks for
how an object really is (‘from-the-outside’ perspective), and also of what he calls a ‘second-order’
perspective, where the researcher looks for how others understand and experience the reality (‘from-
the-inside’ perspective).43 Phenomenography, being based on this second-order perspective, derives
meaning from a subject’s understanding and experience of an object.44 It also focuses on the variation
in how a phenomenon is perceived by participants and by the researcher. This variation is called the
‘theory of variation’.45 Phenomenography thus allows the use of the experiences of the researcher
and participants in the undertaking of a collective analysis of individual experiences.46 In the same
way, its introspective approach47 enables it to adequately describe the real feelings and experiences
37 Marton, “Phenomenography,” 177. 38 Marton, “Phenomenography,” 177. 39 Marton, “Phenomenography,” 177. 40 Barnard, McCosker and Gerber, “Phenomenography,” 212. 41 Barnard, McCosker and Gerber, “Phenomenography,” 213. 42 Marton, “Phenomenography,” 181. 43 Ference Marton, “Phenomenography - A Research Approach to Investigating Different Understandings of
Reality,” Journal of Thought 21, no. 3 (1986): 28-49. Marton, “Phenomenography,” 177-200. 44 Khan, “Phenomenography: A Qualitative Research Methodology in Bangladesh,” 35. 45 Ming Fai Pang, “Two Faces of Variation: On Continuity in the Phenomenographic Movement.”
Scandinavian Journal of Educational Research 47, no. 2 (2003): 145-156. 46 Gerlese S. Åkerlind, “Variation and Commonality in Phenomenographic Research Methods,” Higher
Education Research and Development, 24, no. 4 (2005), 321-334; Michael Uljens, “On the Philosophical
Foundation of Phenomenography,” in Reflections on Phenomenography - Towards a Methodology? eds.
Gloria Dall'Alba and Biörn Hasselgren (Goteborg: Acta Universitatis Gothenburgensis, 1996), 105–130; and
Roger Säljö, “Minding Action - Conceiving of the World versus Participating in Cultural Practices,” in
Reflections on Phenomenography - towards a Methodology? eds. Gloria Dall'Alba and Biörn Hasselgren
(Goteborg: Acta Universitatis Gothenburgensis, 1996), 19-33. 47 John T. E. Richardson, “The Concepts and Methods of Phenomenographic Research,” Review of Educational
Research 69, no. 1 (1999): 57.
A Qualitative Inspection of Employee Surveillance in India
212
of subjects – in our own case, employees’ real feelings and experiences about surveillance practices
in their workplaces.
As indicated above, employees were asked questions in two formats, choosing from pre-determined
themes (Sample A) and freeform expression in a narrative context (Sample B). The questions
concerned whether surveillance practices in their workplace accor with what they want or expect.
There are assorted reasons for the higher percentage of male respondents (58%) than female (42%)
in the survey. A culturally experienced male (patriarchal) domination of workforce ratio, as discussed
in the second chapter, is one major reason for it.48 Less female participation in the urban workforce
is another.49 More female participants shared that they do not want to respond to a survey using
official contact tools such as emails, etc. However, they were ready to respond in a private chat via
social networks. In the same way, equal participation of male and female employees in the narrative
section shows that female participants were reluctant to respond to a structured survey due to the fear
of being discovered by authorities and other concerns of related to job retention. This itself seems to
present evidence of fear and self-censorship. In the following, a detailed discussion of the study
results is presented.
5.4.2 Against the Performance, Productivity, and Security Claims
Is technology the best way to measure productivity? Can employee performance and productivity be
measured by keystrokes, time spent on a computer, or the duration of phone calls? The management
of business organizations and corporations claim to have dramatically improved employee
performance and thus increased levels of productivity thanks to electronic monitoring techniques.
Several studies have conducted from this perspective.50 By contrast, our own study shows that
employees feel otherwise, as their efforts to adhere to the organization’s standard often compromises
their personal and work-related desires. Several other studies have been conducted in this regard and
48 Among women population, only 51% is literate and the labour participation is 33% in 2011-2012. A study
giving socio-economic statistical information about India, by Indiastat, entitled “Workforce Participation
Rate by sex and sector in India” (2013), report that the 2010 workforce participation rate was 26.1% for
women in rural India and only 13.8% for women in urban areas. See for instance, Indiastat, Socio-economic
Statistical Information About India,
https://www.indiastat.com/labourandworkforce/380987/workparticipation/299/stats.aspx [accessed June 20,
2017]; Ritu Bhattacharyya, “Skill Development Among Women – Awareness and Need – Study on Nation
Skill Development Mission,” GE-International Journal of Management Research 5, no. 1 (2017): 338; Tooba
Modassir and Ramesh B., “Women Representation in Corporate Boards of BSE Listed Companies and Causes
of Their Low Workforce Participation in India,” International Journal on Arts, Management and Humanities
4, no. 1 (2015): 53. 49 Bhattacharyya, “Skill Development Among Women,” 338. 50 Hamed Al-Rjoub, Arwa Zabian and Sami Qawasmeh, “Electronic Monitoring: The Employees Point of
view,” Journal of Social Sciences 4, no. 3 (2008): 189-195. Lynne Haley Rose, “The Advantages of
Surveillance in the Workplace,” Chron, http://smallbusiness.chron.com/advantages-surveillance-workplace-
21607.html [accessed June 5, 2017]; Patricia Findlay and Alan McKinlay, “Surveillance, Electronic
Communications Technologies and Regulation,” Industrial Relations Journal 34, no. 4 (2003): 305-314;
Sjaak Nouwt, Berend R. de Vries and Roel Loermans, “Analysis of the Country Reports,” in Reasonable
Expectations of Privacy?: Eleven Country Reports on Camera Surveillance and Workplace Privacy, eds.
Sjaak Nouwt, Berend R. de Vries and Corien Prins (Cambridge: T.M.C. Asser Press. 2005), 323-357; A.
Conry-Murray, “The Pros and Cons of Employee Surveillance.” Network Magazine 12, no. 2 (2001): 62-66;
Elise M. Bloom, Madeleine Schachter and Elliot H. Steelman, “Competing Interests in the Post 9-11
Workplace: The New Line Between Privacy and Safety,” William Mitchell Law Review 29, 3 (2003): 897-
920; Jintae Lee and Younghwa Lee, “A Holistic Model of Computer Abuse within Organizations,”
Information Management & Computer Security 10, no. 2 (2002): 57-63; David Porter, “Insider Fraud:
Spotting the Wolf in Sheep’s Clothing,” Computer Fraud & Security 4 (2003): 12-15; Kristen Bell DeTienne,
“Big Brother or Friendly Coach? Computer Monitoring in the 21st Century,” The Futurist 27, no. 5 (1993):
33-37.
A Qualitative Inspection of Employee Surveillance in India
213
support the results of our own.51 The increasing level of distrust in organizations and among
employees themselves directly causes employees to feel job dissatisfaction. Although several
employees view workplace monitoring as a necessary security tool and try to understand and accept
it, they are not fundamentally pleased with being monitored and would prefer not to work in a 24/7
surveilled environment. Although behavioural patterns in the workplace are experienced as
multidetermined, and as connected in many and various ways with employees’ life chances, it is not
the case that external moderators in the workplace canguide and direct employee behaviours in every
particular way. This study is an initial attempt to explore and commend the employee perceptions,
feelings and opinion about the monitoring practices in their workplaces.
As a means of security and protection, electronic monitoring systems limit the unmannerly work
practices of employees. This fact is often highlighted by surveillance advocators. Though generally
meant to function as a ‘good watchdog’, these systems create negative feelings among workers,
affecting their productivity and well-being. Our data show that the argument ‘security’ remains a key
reason for monitoring and is acceptable to many people and it seems to play a quite prominent role
in its legitimisation. We have already discussed the security-argument of workplace monitoring in
the first chatper. A total of 44.6% respondents (response count 50) expressed surveillance strenthens
business measures security. As this study shows, security-claim enables employees more willing to
subject themselves to different methods of monitoring. Several respondents who accept these systems
as part of security, still express their concerns in terms of a sense of discomfort, susceptibility and
vulnerability.
Out of 112 respondents, 91 people share their deep concern of reduced freedom and autonomy (44
respondents) and lack of privacy (47 respondents). This also gives evidence that employees value
their privacy, autonomy, freedom, fairness, etc. in the workplace, as the workplace is indeed the
major channel for them to express their relationality and sociability. Employees here find workplace
monitoring objectionable. Continuous observation by means of various technologies seems to reduce
employees’ motivation to commit to extra role responsibilities. Many characterized their employer’s
approach to management as cynical and pessimistic, maintaining that this harmed their relationship
with their employers as well as with their fellow workers. This is made worse by employees’ reported
belief that they are treated in an undignified way and disempowered.
Can surveillance function as a performance management tool? Its supporters also claim that it
promotes worker’s training and development. Deviations are rarely pointed out in order to help
improve employee performance and services; rather, it is most commonly used to punish
51 Maria Karyda and Lilian Mitrou, “Bridging the Gap Between Employee Surveillance and Privacy
Protection,” in Social and Human Elements of Information Security: Emerging Trends and Countermeasures,
eds, Manish Gupta and Raj Sharman (Hershey: IGI Global, 2008), 283-300; Lilian Mitrou and. Maria Karyda,
“Employees’ Privacy vs. Employers’ Security: Can they be Balanced?” Telematics and Informatics 23, no. 3
(2006): 164-178; Kirsten E. Martin and R. Edward Freeman, “Some Problems with Employee Monitoring,”
Journal of Business Ethics 43, no.4 (2003): 353-361; Patricia Findlay and Alan McKinlay, “Surveillance,
Electronic Communications Technologies and Regulation,” Industrial Relations Journal 34, no. 4 (2003):
305-314; Gail Lasprogata, Nancy J. King, and Sukanya Pillay, “Regulation of Electronic Employee
Monitoring: Identifying Fundamental Principles of Employee Privacy through a Comparative Study of Data
Privacy Legislation in the European Union, United States and Canada,” Stanford Technology Law Review 4.
(2004). https://journals.law.stanford.edu/sites/default/files/stanford-technology-law-
review/online/lasprogata-regulationelectronic.pdf [accessed June 15, 2017]; Daniel J. Solove, “A Taxonomy
of Privacy,” University of Pennsylvania Law Review 154, no. 3 (2006): 477-564; Daniel J. Solove,
“Reconstructing Electronic Surveillance Law,” The George Washington Law Review 72 (2004): 1701-1747;
Laura Pincus Hartman, “Ethics: The Rights and Wrongs of Workplace Snooping,” Journal of Business
Strategy 19, no. 3 (1998):16-19.
A Qualitative Inspection of Employee Surveillance in India
214
employees.52 As Bhave maintains,53 surveillance in any form can be detrimental to employee
performance. For instance, electronic monitoring inhibits freedom at work. Freedom at work is vital
to construct a freedom-centered approach, leading to a freedom-centered enterprise and authority.
This also supports the claim of employees that they are not robots to be monitored in every moment
of their working day. A lack of freedom constrains one’s self-disclosure as a human self. Freedom
in the workplace indirectly promotes one’s ability to manage one’s own self-expression and to focus
on what one can control by oneself, rather than letting problems define one. Moreover, as illustrated
above, the greater the restriction imposed, the more employees come to feel rage toward those with
whom they work.
Can surveillance provide irrefutable evidence of criminal conduct in the workplace? Does it improve
organizational safety and security? Is it a proper part of law-enforcement efforts to combat work-
related misconduct? Does CCTV deter crimes? Studies point rather to a displacement of crime to
contexts that are less susceptible to surveillance tools. This shows that, although innovative systems
create uncertainty for the offender for a while, as this uncertainty fades, offenders develop new
approaches and commit the same crimes successfully.54 Evidence suggesting a decrease in crime
rates in highly surveilled contexts does not account for a significant number of offenders.55 Moreover,
several researchers have noted that the increased use of surveillance technologies actually make the
prosecution of transgressions more difficult, and seldom if ever preventmisconduct in the
workplace.56 The arguments that increased surveillance has the effects of crime prevention and
liability alleviation, therefore, are not always consistent with the employee security argument.
For instance, as one respondent opines, “… it is implemented as part of security, but I feel insecure
working under it, and it also restricts my freedom and privacy. Now-a-days, monitoring is on
ourselves [employees], not on our work or performance.” These specific monitoring technologies
are now targeted at employees themselves rather than at their work activities. Besides, the power
exercised by employers over employees is today virtually unrestricted and unchallenged. In the same
way, it must be noted, employees (30.0% of respondents in this study) generally admit that stress,
anxiety and other detrimental outcomes of surveillance lead to aggressive behaviours and
occupational violence. Employees in this realm make use of unobserved spaces (42.5%) to behave
differently. They resent that employers treat them with suspicion (46.2%) or biased favouritism
(increasing nepotism, for instance). This response substantiates our earlier discussion of social
sorting, where employees are sorted out and discriminated against by being categorized into groups
and thus assigned a certain worth or risk. This also threatens the reputations of employees both inside
and outside the workplace. When it starts to affect marital relationships and family life (22.6%),
employees develop further attitudinal and behavioural tendencies, such as absenteeism or
presenteeism.
52 Michael J. Smith and Benjamin C. Amick III, “Electronic Monitoring at the Workplace: Implications for
Employee Control and Job Stress,” in Job Control and Worker Health, eds. S. L. Sauter, J. J. Hurrell Jr and
C. L. Cooper (Chichester, UK: Wiley, 1989), 275-290. 53 Devasheesh P. Bhave, “The Invisible Eye? Electronic Performance Monitoring and Employee Job
Performance,” Personnel Psychology 67, no. 3 (2014): 605-635. 54 Nick Tilley, “Whys and Wherefores in Evaluating the Effectiveness of CCTV,” International Journal of
Risk, Security and Crime Prevention 2, no. 3 (1997): 175-185. 55 Colin J. Horne, “The Case For: CCTV Should Be Introduced,” International Journal of Risk, Security and
Crime Prevention 1, no. 4 (1998): 323. 56 Martin and Freeman, “Some Problems with Employee Monitoring,” 355.
A Qualitative Inspection of Employee Surveillance in India
215
5.4.3 In Defence of Privacy, Impartial Treatment and Dignity
Employees offer justifications for workplace privacy, impartial treatment and human dignity that go
beyond our own conceptual considerations above and include pragmatic concerns.57 Does electronic
surveillance in the workplace respect employee privacy? This study shows that the necessity of
“personal space” is highly valued by employees.58 To know the nature of workplace privacy, the
third chapter, above, has explored the argument of control theory, restricted access theory, etc.
However, developments in available information technologies have forced employees and the public
to reconsider the concept of privacy.59 Privacy is viewed here as a “good for its own sake and not
merely as a means to protect an individual or to increase productivity.”60 This study clearly suggests
that ubiquitous and pervasive monitoring hinders one’s privacy at work and restricts one’s freedom
and autonomy.61 Though there is a reasonable expectation that some space will be “left
unmonitored,” this is often not satisfied. A substantial number of respondents claimed that
surveillance invades privacy (42.0%) by restricting freedom and autonomy (39.3%), which also
affects the basis of self-determination and self-identity.
Employees expect unbiased/unprejudiced and equitable treatment that respects their dignity as
human beings. Several (19.6%) expressed a view that continuous surveillance practices are
dehumanizing and a threat to human dignity. Indeed, electronic surveillance, and the use of CCTV
in particular, often leads to prejudicial treatment of employees basing on certain stereotypical
assumptions held by those who are conducting the surveillance.62 Clive Norris’ research on CCTV
use and crime prevention points out that “[t]he young, the male and the black were systematically
and disproportionately targeted, not because of their involvement in crime or disorder, but for “no
obvious reason” and on the basis of categorical suspicion alone.”63 The use of data for confirmatory
57 Jay R. Lund, “Electronic Performance Monitoring: A Review of the Research Issues,” Applied Ergonomics
23, no. 1 (1992): 54-58. 58 The apparent necessity of personal space in the workplace is already discussed by number of researchers like
Philip Brey (2001), Dag Elgesem (1996), and Richard Spinello (1997). Cf., Philip Brey, “Disclosive
Computer Ethics,” in Readings in Cyber Ethics, eds. Richard A. Spinello and Herman T. Tavani (Sudbury,
MA: Jones and Barlett, 2001), 51-62; D. Elgesem, “Privacy, Respect for Persons, and Risk,” in Philosophical
Perspectives on Computer-Mediated Communication, ed. Charles Ess (Albany: State University of New York
Press, 1996), 45-66; and R. Spinello, Case Studies in Information and Computer Ethics (Upper Saddle River,
NJ: Prentice Hall, 1997). 59 Martin and Freeman, “Some Problems with Employee Monitoring,” 355. Michael Selmi, “Privacy for the
Working Class: Public Work and Private Lives,” Louisiana Law Review 66, no. 4 (2006): 1043. 60 Martin and Freeman, “Some Problems with Employee Monitoring,” 357. 61 The argument and ethical consideration of autonomy centralizes the individualized or ‘own’ design of life
to develop and prosper in worklife. Not allowing employees to generate or possess this personal space,
according to Stahl et al., “is thus an expression of a lack of respect for their wishes and needs.” Stahl et al,
“Electronic Monitoring in the Workplace,” 67. 62 Michael J. Dee, “The Use of CCTV to Police Young People in Public Spaces - A Case of Big Brother or Big
Friend?” Paper presented at the 27th International Conference on Making Cities Livable, Vienna, Austria. De
Montfrot University, Youth and Community Division, Scraptoft Campus, Leicester, LE7 9SU, U.K., 2000;
Simon G. Davies, “The Case Against: CCTV Should Not Be Introduced,” International Journal of Risk,
Security and Crime Prevention 1, no. 4 (1996): 327-331; Clive Norris and Gary Armstrong, The Unforgiving
Eye: CCTV Surveillance in Public Space (Mimeo. Hull, UK: Centre for Criminology and Criminal Justice,
University of Hull, 1997); Clive Norris and Gary Armstrong, “CCTV and the Social Structuring of
Surveillance,” In Surveillance of Public Space: CCTV, Street Lighting and Crime Prevention. Crime
Prevention Studies. Vol. 10, eds. Kate Painter and Nick Tilley (Monsey, NY: Criminal Justice Press, 1999a),
157-178. 63 Clive Norris, “From Personal to Digital: CCTV, the Panopticon, and the Technological Mediation of
Suspicion and Social Control,” in Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination,
ed. David Lyon (London: Routledge, 2003), 266. See also, Norris and Gary Armstrong, “CCTV and the
Social Structuring of Surveillance,” 175-176.
A Qualitative Inspection of Employee Surveillance in India
216
or manipulative purposes largely depends on the one who holds the data. As Peter French opines,
“[a]lthough cameras work 24 hours a day, seven days a week, 365 days a year; rarely go sick; do not
take maternity leave, refreshment or smoking breaks; and do not go to the lavatory - they don't
actually do anything. It is the operators that produce the results required.”64 In this research context,
employees experience that the data collected is used for biased treatment. Just as the research findings
of Norris and Armstrong reveal, this discrimination is based not on individualized behavioural
criteria, but on one’s belonging to a particular group65 or situation. This study identifies these same
experiences in the workplace. This type of categorical suspicion and the ensuing discriminatory
practices intensify “the surveillance of those already marginalized and further increases their chance
of official stigmatization.”66 This leads, in turn, to a lack of autonomy,67 causes an affront to human
dignity,68 and dilutes the humanity of employees according to their merely peripheral features.
This phenomenon is evident when the target of monitoring changes. There is a shift happening, as
this study also observes, from monitoring work or performance towards monitoring employees
themselves, and from employees’ work lives to monitoring their private lives. It is especially difficult
to evaluate employees based on data taken directly or indirectly from electronic monitoring systems
that include an assessment of the “human” aspects of employees and their work, including their
motivation and performance and the quality of their work. Similarly, claims of safety and security
(employer, employee, property and service) can never wholly dispel the ontological insecurity one
feels in the workplace. The all-pervasive external power control envelops the person and induces a
feeling of powerlessness and even worthlessness. The problem of power distance and the unequal
use and distribution of power in the Indian workplace is evident here.69 The previous discussion in
the fourth chapter, on Michael Foucault’s discourse on surveillance and power, offers a theoretical
framework for understanding this debate. The quality of human [employee] existence is thoroughly
challenged here.70 Therefore, though workplace monitoring seems to comply with a legal or
regulatory framework, the impact assessment from the perspective of employees shows that
ubiquitous surveillance becomes problematic and cannot in the end be ethically justified.
64 Peter French, “Video Nation,” Police Review (3/7/98).
http://www.1in12.com/publications/cctv/bubble.html [accessed June 10, 2017]. The CCTV can be socially
beneficial and harmful as Jock Young rightly elucidates that “it can invade privacy and make Orwell’s 1984
a reality. But it can also […] be liberating and protective.” Jock Young, The Exclusive Society (London:
Sage, 1999), 192. So, its usage and effects depend also upon the one who holds the data and process further
for a desired result. 65 Clive Norris and Gary Armstrong, The Maximum Surveillance Society: The Rise of CCTV (Oxford: Berg,
1999b), 150. See also, Norris, “From Personal to Digital,” 266. 66 Norris, “From Personal to Digital,” 266. 67 Martin and Freeman, “Some Problems with Employee Monitoring,” 357. 68 Thomas Hoeren and Sonja Eustergerling, “Privacy and Data Protection at the Workplace in Germany,” in
Reasonable Expectations of Privacy: Eleven Country Reports on Camera Surveillance and Workplace
Privacy, eds. Sjaak Nouwt, Berend R. de Vries and Corien Prins (The Hague, PA: TMC Asser Press, 2005),
211-244; Michael Selmi, “Privacy for the Working Class: Public Work and Private Lives,” Louisiana Law
Review 66, no. 4 (2006): 1035, 1042-1049. 69 The same result is found analyzing researchers like Forester and Morrison. Cf., Tom Forester and Perry
Morrison, Computer Ethics – Cautionary Tales and Ethical Dilemmas in Computing, 2nd ed. (Cambridge:
The MIT Press, 1994). 70 Some traces of this argument can be seen in William S. Brown. See for instance, Brown, “Ontological
Security, Existential Anxiety, and Workplace Privacy,” 65.
A Qualitative Inspection of Employee Surveillance in India
217
5.4.4 Other Major Employee Concerns
Conditions in a highly surveilled workplace negatively impact the trust and mutual confidence
between employer and employee.71 This study shows that ubiquitous monitoring inhibits employee
creativity and innovation. Employees feel overwhelmed when they are aware that every word they
utter, every keystroke they make, every movement they take, and every document they analyse are
recorded and can be retrieved at will by their employer, even after a long time. According to this
study, close to half of the respondents (employees) in India reported excessive pressure at work.
Almost all of them pinned the blame on the overwhelming pressure exerted by employers through
monitoring. This corresponds to the findings of previously conducted studies.72 In the same way, a
full-time mask is worn by employees when they deal with unconventional or sweeping ideas. They
consistently feel a need to filter their communication and its content.73 The monitoring process forces
employees to conform to the express desires and demands of their employers,74 and thus creativity is
stifled and work performance decreased. In this situation, employees are encouraged to value work-
quantity over work-quality.75 Concern about the desire and decisions of their observers is constant
and hinders innovation.
Gradually, this leads one to submit to the‘paternalistic expectations’ of the authorities.76 In the
employer-employee relationship, “employees began to act like children with parental
expectations.”77 In this situation, “employees may begin taking on the role of children as their
employer decreases their level of privacy.”78 This ‘meekness’ responds to the challenging
expectations of work by surrendering entirely to the ‘mentors’ in the workplace. We see this
phenomenon as part of traditional ‘role’ fixing in the Indian socio-cultural context. A feeling of
vulnerability and powerlessness is the key result here. Another disturbing effect of this compulsive
submission is, –according to Erich Fromm’s psychoanalytic work, that the “individual becomes an
automaton, loses his self, and yet at the same time consciously conceives of himself as free.”79 The
distinction that Fromm makes between ‘freedom from’ (from restrictions imposed by others or by
institution) and ‘freedom to’ (to engage in creative and spontaneous acts out of the fullness of one’s
71 Stéphane Desrochers and Alexia Roussos, “The Jurisprudence of Surveillance: A Critical Look at the Laws
of Intimacy,” Lex Electronica 6, no.2 (2001): 1-12. 72 For instance, see the study Towers Watson/NBGH 2013/2014: Employer Survey on Purchasing Value in
Health Care conducted by Towers Watson. Willis Towers Watson, “Full Report: Towers Watson/NBGH
2013/2014 Employer Survey on Purchasing Value in Health Care,” May 2014,
https://www.towerswatson.com/en/Insights/IC-Types/Survey-Research-Results/2014/05/full-report-towers-
watson-nbgh-2013-2014-employer-survey-on-purchasing-value-in-health-care [accessed June 20, 2017]. See
the reference also in: Preeti Kulkarni and Neha Pandey Deoras, “Why Employees in India are Stressed at
Workplaces,” The Economic Times, June 19, 2015,
http://economictimes.indiatimes.com/magazines/panache/why-employees-in-india-are-stressed-at-
workplaces/articleshow/47655329.cms [accessed June 15, 2017]. 73 Martin and Freeman, “Some Problems with Employee Monitoring,” 356. 74 Martin and Freeman, “Some Problems with Employee Monitoring,” 356. 75 John R. Aiello and Carol M. Svec, “Computer Monitoring of Work Performance: Extending the Social
Facilitation Framework to Electronic Presence,” Journal of Applied Social Psychology 23, no. 7 (1993): 537-
548; R.H. Irving, C. A. Higgins and F.R. Safayeni, “Computerized Performance Monitoring Systems: Use
and Abuse,” Communications of the ACM 29, no. 8 (1986): 794-801; and, A. F. Westin, “Two Key Factors
That Belong in a Macroergonomic Analysis of Electronic Monitoring: Employee Perceptions of Fairness and
the Climate of Organizational Trust or Distrust,” Applied Ergonomics 23, no. 1 (1992): 35-42. 76 Hartman, “Ethics: The Rights and Wrongs of Workplace Snooping,” 16-19; Martin and Freeman, “Some
Problems with Employee Monitoring,” 356. 77 Martin and Freeman, “Some Problems with Employee Monitoring,” 356; Hartman, “Ethics: The Rights and
Wrongs of Workplace Snooping,” 16-19. 78 Martin and Freeman, “Some Problems with Employee Monitoring,” 357. 79 Erich Fromm, Escape from Freedom (Avon Books, New York, 1969), 269.
A Qualitative Inspection of Employee Surveillance in India
218
integrated personality) causes “the spontaneous realization of the self,” in which “man unites himself
anew with the world.”80 A lack of this form of freedom in the workplace and the complete subjugation
of employees to their employer as a paternalistic figure leaves one uncertain how to engage in one’s
work in a systematic and innovative way.
Workplace monitoring also leads to behavioural alterations. Individuals think and act differently
when they are being monitored and when they are not.81 One’s feeling towards one’s work and
workplace, as well as one’s attitudes and beliefs, emotions and behaviours, can be adversely affected
when working under continuous surveillance.82 Those who are being observed start to think and act
according to the expectations and demands of the observer. This is called “anticipatory conformity,”
whereby “the socially desirable response is presented in anticipation of the demand.”83 One presents
a desired [or occasionally undesired] response in anticipation to these demands. This results in the
creation of an inauthentic self and often, as Brown states, “leads to feelings of guilt over perceived
unworthiness of the authentic self, and awareness of the gulf between the idealized self and the
realized self.”84 The end-result of this is a cavernous feeling of alienation,85 which is reflected in the
workplace in the form of absenteeism, presenteeism and high levels of attrition.
Working under continuous monitoring also heightens levels of depression and anxiety, stress and
related health hazards among monitored employees as compared to non-monitored employees.86
Electronic monitoring in the workplace, according to Richard L. Worsnop, makes employees “feel
like prisoners hooked up to a computer; mistreated, guilty, paranoid, enslaved, violated, angry, and
driven at a relentless pace.”87 In our present study, it is observed that the percentage of people
experiencing physical and mental stress are about 37%. This also leads to somatic health complaints
80 Fromm, Escape from Freedom, 261. 81 Martin and Freeman, “Some Problems with Employee Monitoring,” 357. 82 Stanton, Jeffrey M. “Reactions to Employee Performance Monitoring: Framework, Review, and Research
Directions.” Human Performance 13, no, 1 (2000): 85-113. 83 William S. Brown, “Ontological Security, Existential Anxiety, and Workplace Privacy,” Journal of Business
Ethics 23, no. 1 (2000): 64. 84 Brown, “Ontological Security, Existential Anxiety, and Workplace Privacy,” 64. 85 Brown, “Ontological Security, Existential Anxiety, and Workplace Privacy,” 64. Brown, quoting Richard
Schacht, explains three forms of alienation: (1) alienation as separation - estrangement from someone or
something other than oneself, with which one should ideally be united; (2) alienation as transfer – one gives
up or no longer has ownership over something that belonged to one; and (3) alienation as derangement – one
is not oneself – in other words – one is a stranger to oneself.” Brown, “Ontological Security, Existential
Anxiety, and Workplace Privacy,” 64-65; Richard Schacht, The Future of Alienation (Urbana and Chicago:
University of Illinois Press, 1994), 38. 86 Christopher Pearson Fazekas, “1984 is Still Fiction: Electronic Monitoring in the Workplace and U.S.
Privacy,” Duke Law & Technology Review 3, no. 1 (2004): 1-17; Michael J. Smith, Pascale Carayon, K. J.
Sanders, S Y Lim and David LeGrande, “Employee Stress and Health Complaints in Jobs with and Without
Electronic Performance Monitoring,” Applied Ergonomics 23, no. 1 (1992): 17-27; Benjamin C. Amick III
and Michael J. Smith, “Stress, Computer-Based Work Monitoring and Measurement Systems: A Conceptual
Overview,” Applied Ergonomics 23, no. 1 (1992): 6-16; Michael Levi, “Electronic Monitoring in
the Workplace: Power through the Panopticon.” 1994.
http://besser.tsoa.nyu.edu/impact/s94/students/mike/mike_paper.html [accessed June 15, 2017]; and U.S.
Congress, Office of Technology Assessment, “The Electronic Supervisor: New Technology, New Tensions,”
OTA-CIT-333 (Washington, DC: U.S. Government Printing Office, 1987), 50-54. 87 Richard L. Worsnop, “Privacy in the Workplace: Does Electronic Monitoring Violate Workers’ Privacy?”
CQ Researcher 3, no. 43 (1993): 1025. Cf. Kaupins and Coco, “Perceptions of Internet-of-Things
Surveillance by Human Resource Managers,” 54.
A Qualitative Inspection of Employee Surveillance in India
219
and emotional disorders.88 About 30% of respondents state that they experience unease and various
other health-related problems and dissatisfactions at work.
One adverse effect of CCTV camera use on employee health is due to radiation emission.89 CCTV
cameras, as electronic devices, emit some minor radiation.90 Some surveillance cameras have
infrared (IR) emitters around the lens so they can capture images even in complete darkness. Being
an electronic device, these produce a small electromagnetic field and transmit radio frequency (RF)
signals to a base station. Though these radiation emissions are in themselves negligible, long-term
exposure to them can cause serious health problems.91 For instance, people who work in
circumstances where they are exposed to infrared radiation for prolonged periods may experience
damage to their eyes, skin and other body tissues.92 Long-term exposure to this radiation can cause
other health problems as well, such as cardiac problems, iron deficiencies in the blood, etc. Radiation
can damage the DNA inside a cell's nucleus, and if the DNA is sufficiently damaged, the cell can
become cancerous. Exposure to excessive amounts of radiation, or lower amounts over an extended
period, can significantly increase the risk of developing these diseases.
IR frequencies can scratch tissues and lead people to develop tissue-specific lesionsover a period of
months or years of continuous exposure.93 The severity of the radiation-induced skin injury and other
complications and health hazards largely depends on the dose received, the surface area of exposed
skin and the radio sensitivity of individuals.94 Besides this, studies on hearing deficiencies caused by
prolonged exposure to radiofrequency radiation95 can be applied to the workplace. Similarly, the GPS
devices used in automobiles generate large amounts of radiation during use, which, after continued
88 Köksal Büyük and Uğur Keskin, “Panopticon’s Electronic Resurrection: Workplace Monitoring as an Ethical
Problem,” Turkish Journal of Business Ethics 5, no. 10 (2012): 75-88; Jitendra M. Mishra and Suzanne M.
Crampton. “Employee Monitoring: Privacy in the Workplace?” S.A.M. Advanced Management Journal 63,
no. 3 (1998): 4-11. 89 Graham T. Smith, Machine Tool Metrology: An Industrial Handbook (Switzerland: Springer, 2016), 527-
536; Herman Kruegle, CCTV Surveillance: Video Practices and Technology, 2nd ed. (Burlington, MA:
Elsevier, 2007), 130-132. 90 Simple digital cameras emit only electromagnetic radiation, which is weaker than ultra violet (UV) rays.
Many businesses and corporations use now infrared (IR) camera, because it not only functions as a crime
deter, but helps to monitor areas in law light or even in complete darkness. For, “a commercial security system
that uses an infrared (IR) camera harnesses the electro optic process that will digitize the electromagnetic
waves emitted in the area of focus and turn it into an image that will be used for surveillance and monitoring.”
USA Security Systems Blog, “How Electromagnetic Waves are Used in Security Cameras,” Surveillance
Cameras & Security News, March 25, 2014. http://blog.usasecuritysystems.com/electromagnetic-waves-
used-security-cameras/ [accessed June 20, 2017]. 91 The American Cancer Society Medical and Editorial Content Team. “Microwaves, Radio Waves, and Other
Types of Radiofrequency Radiation.” American Cancer Society, May 31, 2016.
https://www.cancer.org/cancer/cancer-causes/radiation-exposure/radiofrequency-radiation.html [accessed
June 20, 2017]. 92 Exposure to intense electromagnetic radiation, including infrared radiation, can damage the lens and cornea
of the eye. Therefore, staring at the sun is said to be harmful and unintelligent. Media Centre, WHO, “Ionizing
radiation, Health Effects and Protective Measures,” Fact Sheet: World Health Organization, April 2016,
http://www.who.int/mediacentre/factsheets/fs371/en/ [accessed June 20, 2017]. 93 Sudha Rana, Raj Kumar, Sarwat Sultana and Rakesh Kumar Sharma, “Radiation-Induced Biomarkers for
the Detection and Assessment of Absorbed Radiation Doses” Journal of Pharmacy and Bioallied Sciences 2,
no.3 (2010): 189-196. 94 Rana et al., “Radiation-Induced Biomarkers for the Detection and Assessment of Absorbed Radiation
Doses,” 189-196. 95 M. Frauk Oktay, et al. “Occupational Safety: Effects of Workplace Radiofrequencies on Hearing
Function.” Archives of Medical Research 35 (2004): 517-521.
A Qualitative Inspection of Employee Surveillance in India
220
and extended use, can cause dizziness and insomnia and harms the reproductive system.96 These
problems seriously affect employees who are continuously exposed to such devices. In the following,
we make some detailed and conclusive remarks on the study described in this chapter.
5.5 ELECTRONIC SURVEILLANCE: A POOR SOLUTION TO WORKPLACE CONCERNS
As discussed in the second chapter, the implementation and use of electronic surveillance is on the
rise and has become routine in the Indian organizational workplace. The socio-cultural and economic
situations in India, including commerce and trade, have significantly supported this scenario. This
study also proves that the use of active monitoring systems in the workplace is increasing (88.6% of
respondents acknowledged the presence of electronic monitoring systems in their companies) and
that the performance and communications of employees are under strict scrutiny. Though few
employees responded positively to surveillance practices, typically as a means to ensure security,
many of them still express its negative impacts. Studies prove that any external monitoring practice
can have negative effects on employees.97 It can increase stress levels and decrease job satisfaction.
Increased productivity is not always a result, and even where it is, it is often accompanied by a
decrease in the quality of products and services. Besides, even where the short term results of
surveillance seem impressive, researchers doubt its long-term benefits.98
One of the major concerns expressed by an employee is that the following:
“… all individuals are different and there way of working is also different. Hence every action of
employee shouldn’t be traced & tracked. Most of the companies use monitoring at work just to
stop the unethical practices or harassment against the women employees for the security purpose.
In the recent past, it was in news companies track the Idle time of systems to capture employees
work, as an employee it just breaks the trust on employee on the employer/company. The employee
attrition will be more in those kinds of employees.”
Many employees spoke openly about their privacy concerns, stating for example that “our personal
privacy is sometimes compromised, when we are aware that, we are being monitored then we tend
to be more conscious, unsettled.” This leads to unnecessary fear, as one employee rightly noted: “…
much like public speaking, as soon as we step in front of the camera, our knees and hands start to
tremble, our voice get soft, it feels like someone looking straight into your eyes and judging you.” A
few female employees responded very harshly to it. For instance, one says, “it limits my freedom,
when there is no freedom there is no creativity. we are not robots to monitor all-time during the
work. It makes me exhausted at work and feel the same when I am back home.” Another exclaims,
96 Fei, Liang. “Dangerous Navigation.” Global Times: Discover China, Discover the World, September 5,
2013. http://www.globaltimes.cn/content/780549.shtml [accessed June 20, 2017]. 97 Don DiTecco, G. Cwitco, A. Arsenault and M. André, “Operator Stress and Monitoring Practices,” Applied
Ergonomics 23, no. 1 (1992): 29-34; John R. Aiello and Kathryn J. Kolb, “Electronic Monitoring and Social
Context: Impact on Productivity and Stress,” Journal of Applied Psychology 80, no. 3 (1995): 339-359;
Michael J. Smith, et al., “Employee Stress and Health Complaints in Jobs with and Without Electronic
Performance Monitoring.” Applied Ergonomics 23, no. 1 (1992): 17-27; Rebecca Grant and Christopher
Higgins, “Monitoring Service Workers via Computer: The Effect on Employees, Productivity, and Service,”
National Productivity Review 8, no. 2 (1989): 101-112; Roland E. Kidwell Jr., Nathan Bennett, “Employee
Reactions to Electronic Control Systems: The Role of Procedural Fairness,” Group & Organizational
Management 19, no. 2 (1994): 203-218; Terri L. Griffith, “Monitoring and Performance: A Comparison of
Computer and Supervisor Monitoring,” Journal of Applied Social Psychology 23 no. 7 (1993): 549-572;
Delbert M. Nebeker and B. Charles Tatum, “The Effects of Computer Monitoring, Standards, and Rewards
on Work Performance, Job Satisfaction and Stress,” Journal of Applied Social Psychology 23 no. 7 (1993):
508-536. 98 Stanton, “Reactions to Employee Performance Monitoring,” 108.
A Qualitative Inspection of Employee Surveillance in India
221
“do they not trust us? Surveillance inhibits freedom at work. The more we are restricted the more
rage with others we become.” Yet another female employee asks, “am I a prisoner to be always
watched over? Workplace should not be equated with prisons. Why should a stranger observe
women’s privacy in the name of surveillance?” Several female employees also spoke about distrust,
power control and related stress, for example stating that:
(1) “I feel the element of distrust is the key here. It also leads to the creation of artificial
professional behaviour. It is the indication from the management that they do suspect
us.”
(2) “Now, it goes beyond performance evaluation and intrude our privacy and restrict
the freedom It is used because, with a fear tactic, the management wants to get full
control over us. For me it creates an atmosphere of mistrust at work.”
(3) “For the management, it may act as a moral check on the employees, but I am too
much stressed and feel very uncomfortable to work being under monitoring. Not
allowing us to have or enjoy a bit of own space is like a crime done to our human self
and shows the lack of respect to our needs and wants.”
Employees are concerned to protect totally private and personal things that cannot be made public.
So, any forced intrusion into one’s private sphere is seen to constitute a violation of their human
dignity. In view of all these responses, it seems clear that, at least from an employee’s perspective,
‘on/off the job’ surveillance cannot simply fix all the problems that arise in the workplace, as some
employers seem convinced it can. The concerns related to human dignity will be analyzed in detail
in the next chapter.
What then do employees themselves seek and stand for? When an employee states that “I am sure
that in order to be productive and responsible I do not need an external monitoring,” one can see the
need and ability of employees to be self-disciplined in the workplace. Responsible self-monitoring
is preferred by most of the employees who responded to the survey conducted for this study. Along
with these were a few respondents who were not bothered at all about surveillance, stating for
example that “… most of the times I don't care much about it, for me it makes no difference whether
if it is under electronic surveillance or not.” Certain others held that “a person's productivity and
talent can be molded and used effectively only under proper monitoring and surveillance.” However,
a majority of respondents prefer to work without being monitored or made to feel uncomfortable due
to surveillance practices in the workplace. This is expressed by one employee as follows: “it takes
away my work satisfaction” and “I am not a slave to work like this,” and “I feel I have the dedication
and commitment towards the work which I'm doing. My responsibility does not change according to
the level of external monitoring.” At least in their own estimation, these employees are ready to
assume responsibility for their work without the imposition of any external force or constraint.
A majority of employees who responded to this study (more than 75 percent, in Sample A) preferred
self-monitoring to any kind of external electronic or non-electronic surveillance as a means to
improve efficiency and effectiveness. Several responses focused on the importance of individual
motivation and responsibility: “I am sure that in order to be productive and responsible I do not need
an external monitoring” and “… my responsibility does not change according to the level of external
monitoring.” Other comments exhibit this same spirit of embracing self-monitoring and taking
responsibility for one’s own work: “I am not a slave to work like this” and “I change my behaviour
to please the authority.” Self-monitoring generally refers to the ability of individuals “to adjust his
A Qualitative Inspection of Employee Surveillance in India
222
or her behaviour to external, situational factors,”99 which leads, in the context of our research here,
to better performance and increased productivity.
Several studies indicate that a form of “self” monitoring is demanded and preferred by employees,
and that the feedback loop of self-monitoring improves performance in various situations.100 Self-
monitoring is found to be a better motivator than any other kinds of monitoring.101 Behavioural self-
monitoring (BSM) is being researched now in many disciplines.102 It is to be noted that, as Gudykunst
et al. argue, individualist and collectivist cultures influence self-monitoring differently. Furthermore,
people with an individualistic background tend to be low self-monitors, while those with a collectivist
background who value conformity to ingroups and are high self-monitors.103 India’s collectivist
cultures and traditions, discussed in the second chapter, show that India is low in individualism and
thus that her employees, when allowed to engage in more collectivist practices, are likely to be high
self-monitors. Self-monitoring as a feasible strategic approach to employee management will be
explored in more detail in the next chapter.
5.6 LIMITATIONS OF THE STUDY
This study has its limitations. The job nature and position of survey respondents may limit the
generalizability of its results. Errors that occur in the data due to incorrect or manipulated responses
may result from (1) a misunderstanding and misinterpretation of the terms used and the intended
meaning of the questions; (2) a fear of being mistreated or even punished by authority figures; and
(3) the distress caused by questions concerning sensitive issues. In the same way, individual
responses may not always accurately represent the self of the person responding, but rather reflect
bias. Some may argue that the sample set (200) is too small, or that the honesty of participants cannot
be guaranteed in such a small-scale interview. Indeed, the nature and relevance of the respondents’
experiences of workplace surveillance determines the truthfulness of their responses. Some
interviewees will respond in the way they expect the interviewer would like, which again jeopardizes
the validity of responses. Mixing up potential and actual tensions in the area discussed may also be
compromising. When respondents are forced to opt for alternatives given, spontaneity and creative
99 Stephen P. Robbins, Rolf Bergman, Ian Stagg and Mary Coulter, Management, 7th ed. (Melbourne: Pearson,
2015), 545. See references for this in: Stephen Robbins, Timothy A. Judge, Bruce Millett and Maree Boyle,
Organizational Behaviour, 7th ed. (Frenchs Forest NSW: Pearson, 2014), 90. The concept of self-monitoring
is introduced by Mark Snyder and perceived as a social construct of expressive behaviour. It is a personality
trait and individual ability to regulate or control one’s behaviour that helps him or her to accommodate social
situations and phenomena. Mark Snyder, “Self-Monitoring of Expressive Behavior,” Journal of Personality
and Social Psychology 30, no. 4 (1974): 526-537. Here, in this study, the concept of self-monitoring is
differentiated from the concept of impression management or the trend of being in desired public appearances. 100 John M. Ivancevich and J. Timothy McMahon, “The Effects of Goal Setting, External Feedback, and Self-
Generated Feedback on Outcome Variables: A Field Experiment,” Academy of Management Journal 25, no.
2 (1982): 359-372; Martin M. Greller, “Evaluation of Feedback Sources as a Function of Role and
Organizational Level,” Journal of Applied Psychology 65, no. 1 (1980): 24-27. 101 Jeffrey M. Stanton, “Reactions to Employee Performance Monitoring: Framework, Review, and Research
Directions,” Human Performance 13, no. 1 (2000): 93. 102 Ryan Olson and Jamey Winchester, “Behavioral Self-Monitoring of Safety and Productivity in the
Workplace: A Methodological Primer and Quantitative Literature Review,” Journal of Organizational
Behavior Management 28, no. 1 (2008): 9-75; Thomas S Critchfield and Ernest A. Vargas, “Self-recording,
Instructions, and Public Self-Graphing: Effects on Swimming in the Absence of Coach Verbal Interaction,”
Behavior Modification 15, no. 1 (1991): 95-112. 103 Gudykunst, William B. et al., “A Cross-cultural Comparison of Self-monitoring,” Communication Research
Reports 6, no. 1 (1989): 7-12.
A Qualitative Inspection of Employee Surveillance in India
223
thinking is limited. With regard to adaptability, it is very difficult to accurately identify the feelings,
thoughts and reasons underlying any individual response.
As in every narrative-response study, it is difficult to analyse or compare responses to open-ended
questions. So, respondents’ points of view need to be brought into focus before making any
generalization about an individual’s attitude, job commitment or interpersonal behaviours. In
analysing the results of this study, it was difficult to calculate the depth of the qualitative information.
What is more, an interviewer/interviewee effect was likely to occur. As Martyn Denscombe opines,
for example, “[i]n particular, the sex, the age, and the ethnic origins of the interviewer have a bearing
on the amount of information people are willing to divulge and their honesty about what they
reveal.”104 Similar to this is the interviewee effect. The extensive coding methods required for a
narrative research study will necessarily limit its scope, as it was conducted with themes the
researcher already had in mind. As with every open-ended questionnaire, this study suffers from
missing and possibly inaccurate data. However, confidence in its conclusion is strengthened by the
fact that its findings complement and fit with the findings of other studies in the growing scholarly
literature on the negative impact of electronic surveillance in the workplace.
5.7 CONCLUSION
The study described in this chapter demonstrates the adverse effects of employee surveillance and
the complexity and limitations of any effort to understand the same. It qualitatively affirms, through
the analysis of employees’ real-time experience, the negative impacts of workplace surveillance that
have already been explored in previous chapters. This often surpasses the anticipated benefits of
surveillance. One concern of the study is to lay a groundwork for envisioning the elimination of
electronic monitoring in the organizational workplace, or at least an elimination of its more adverse
effects. Though researchers in this area have written mostly from psychological or legal perspectives,
our own study demonstrates the need to take a socio-ethical perspective. Employees occupy totally
different attitudinal and behavioural positions depending on whether of not they are under
surveillance. Therefore, this study has considered the effect of electronic monitoring on employee’s
morale, job attitude, workplace behaviour, trust and faith in employer and the commitment towards
the job and life. Employees resist or express discontent in various forms about such workplace
systems and strategies. They regard a few factors to be of overriding importance: privacy and data
security, freedom in their job, securing the trust of their employer and enjoying impartial treatment
in the workplace. External monitoring has not been shown to increase productivity or efficiency in
the workplace, and crucial variables such as trust, commitment, efficiency and performance are
unrelated to any type of monitoring.
Finally, we have seen that workplace monitoring does not help achieve long term goals and
objectives, and indeed demonstrated that the success of employees and organizations is unrelated to
any external monitoring employed in the workplace. Our study also affirms the need to explore the
negative effects of workplace surveillance on employees and in particular the ethical threats posed
to employee rights. Therefore, from an employee’s perspective, electronic monitoring is not a viable
solution for workplace problems. Morally, we would thus contend, it is wrong to use electronic
surveillance in the workplace, and particularly 24/7 ubiquitous monitoring. In this context, an
adequate description of good morale among employees, which is linked to trust and transparency in
the workplace, is a good starting point for generating alterations in employee attitudes, commitments
and behaviours. This could in turn establish a closer connection between employer and employees.
104 Martyn Denscombe, The Good Research Guide: For Small-scale Social Research, 3rd ed.
(Buckingham: Open University Press, 2007), 184.
A Qualitative Inspection of Employee Surveillance in India
224
These conclusions, showing the negative effects of electronic surveillance in real-life work
situations, are consistent with other studies on this theme. Based on these conclusive remarks, the
next chapter discusses the significance of the phenomenon of the body and of body ontology as it
relates to the normative and moral concepts of bodily integrity, human dignity and human
transcendence. The employee responses presented in this chapter, we argue, express a body ontology
that is quite different from the one presumed by current surveillance practices in the organizational
workplace, and one that is far more ethically adequate as a means to preserve and protect employees’
human dignity.
CHAPTER SIX
AN ETHICAL RETHINKING OF WORKPLACE SURVEILLANCE AND MANAGERIAL
BEHAVIOUR
6.0 INTRODUCTION
When new information and communication technologies enter the workplace, it is necessary for both
the employer and employees to have clear ethical guidance. New developments increase the diversity
and ambiguity of situations, rendering them fluid. Many moral rules are at stake in workplace
conflicts such as safety, the duty to care, and issues related to privacy, physical and informational
freedom and discriminative behaviours. The previous chapter has sought to establish empirically the
link between workplace surveillance and employee responses, as well as to afford us some insight
into the job-related well-being or discontentments of employees. Using employee data about India,
the survey conducted as part of this research finds that workplace surveillance is associated with
lower employee satisfaction and a decrease in productivity in the long term. We found no current
pro-employee policies and practices that ameliorate this. Likewise, previous chapters, through the
review of available literature and field study reports, have shown that in most cases the
implementation and use of surveillance technologies seldom improve employee productivity or job
satisfaction. They rather worsen it, by causing behavioural and performance hardships in employees’
work and personal lives. Besides, our previous consideration of the ubiquitous means of surveillance
now in use in organizations align with the research of Richard S. Rosenberg, who finds that “more
surveillance, more loss of privacy, more restrictions, more control by management, and necessarily
less concern with ethical treatment.”1 The more we put privacy at risk, the more we can see the effects
of power control and even, going beyond this, discrimination and social sorting in the workplace.
In this chapter, we aim to develop a general moral framework to understand and ethically respond to
electronic monitoring. This ethical exploration begins by defining workplace ethics and workplace
surveillance ethics. It is followed by a preliminary analysis of what we hold to be a necessary
transition of workplace behaviours that goes beyond the domain of managerial rationality, narrowly
construed. It then follows by outlining an integration of corporate codes of ethics and various
theoretical approaches of moral assessment. The second section tries to balance these ethical
considerations with a tripartitereading of workplace surveillance. A converging employee
perspective, which regards ubiquitous surveillance in the workplace as unethical, further qualifies
this section. This employee standpoint is substantiated through the moral discussion of the
irreducibility of the human person, big data and the body-subject, and ethics of rights, power and
social justice. Finally, the third section presents a religious frame of reference to assess how religion
might be able to reinforce the ethical response to workplace management outlined previously.
6.1 A NEW BENEFICIARY VIEW OF WORKPLACE AND SURVEILLANCE ETHICS
Ethics in business is not only a concern in terms of profits or compliance in the domain of risk
management. It also requires that personal ethics be integrated into a corporate context, which is
itself of course enmeshed with social relations.2 Reaching beyond concerns about law and
compliance, ethics is about the moral character of persons and of culture, and can be defined, in a
1 Richard S. Rosenberg, “The Technological Assault on Ethics in the Modern Workplace,” in The Ethics of
Human Resources and Industrial Relations, eds. John W. Budd and James G. Scoville, 141-172 (Urbana-
Champaign, IL: Labour and Employment Relations Association, 2005), 150. 2 David W. Miller and Michael J. Thate, “Are Business Ethics Relevant?” in Economics as a Moral Science,
eds. Peter Rona and Laszlo Zsolnai, 163-173 (Switzerland: Springer, 2017), 163.
An Ethical Rethinking of Workplace Surveillance
226
business context, as “the art and discipline of discerning the Right, the Good, and the Fitting Action
to take, and having the creativity and courage to do it.”3 Ethics helps indeed to shape the business
culture and character of employers and employees through the lenses of the ‘right,’ the ‘good’ and
the ‘fitting,’ and thus builds integrity and encourages responsible behaviour. It also enhances
employee morale, resulting in good corporate reputation. Mollie Painter-Morland opines that
“[w]hen ethics functions as an integral part of business practice, […] it informs individuals’
perceptions of events from the start and plays an important part in shaping their responses.”4 A
strategic integration of ethics into debates about workplace surveillance is a necessary precondition
to securing more adequate behaviour in this area. For as Painter-Morland observes, “[i]n fact, efforts
to formulate unambiguous normative guidelines for the conduct of business may paradoxically cause
us to neglect those very aspects of human life that both legality and morality attempt to protect.”5
This also necessitates the idea of ‘an ethical culture’6 to enable one to describe, assess and manage
the organizational culture.
A remark contained in the New York based Business Roundtable report of 1988, on Policy and
Privacy in Company Conduct, gives good reasons to think that the question of ethics in business is
the most challenging issue in any corporate scenario today.7 A different modus operandi is thus
required: a shift from common methods of organizational development that focus on control, to an
approach that starts from a person-oriented approach while also focusing on institutional aspects. As
Stefanie Mauksch opines, “organizations are made up of humans who perceive, interpret,
contextualize with thought and affect, choose, and then act.”8 Ethics is thus applied or is relevant to
the conduct of both individuals and entire organizations and refers to the values, norms, principles
and standards of both these variables and consequent behavioural alterations and new ways of
distinguishing right from wrong. Moreover, ethics is described as “an act of dynamic but justifiable
balancing of conflicting interests,”9 and thus in our present research the rights and interests of both
employers and employees need to be taken into account. Business ethicists also describe this as a
harmonization or reconciliation of conflicting interests.10 Hence, the following section will define
what workplace ethics and workplace surveillance ethics mean in the context of work, where the use
of surveillance technologies is so common.
3 Miller and Thate, “Are Business Ethics Relevant?” 168. 4 Mollie Painter-Morland, Business Ethics as Practice: Ethics as the Everyday Business of Business
(Cambridge: Cambridge University press, 2011), 2. 5 Painter-Morland, Business Ethics as Practice, 3. 6 Researchers view ethical culture as part of or the subject of organizational culture and as a help and support
to manage ethical risks by becoming part of ‘ethical risk assessment. Painter-Morland, Business Ethics as
Practice, 11. Refer also for instance, Geert Hofstede, BramNeuijen, dense daval Ohayv and Geert Sanders,
“Measuring Organization Cultures: A Qualitative and Quantitative Study across Twenty Cases,”
Administrative Science Quarterly 35 (1990): 286-316; Linda Klebe Trevino, Kenneth D. Butterfield and
Donald L. McCabe, “The Ethical Context in Organizations Influence on Employee attitudes and Behaviours,”
Business Ethics Quarterly 8, no. 3 (1998): 447-476. 7 W. Edward Stead, Dan L. Worrell and Jean Garner Stead, “An Integrative Model for Understanding and
Managing Ethical Behaviour in Business Organizations,” in Managing Business Ethics, eds. John Drummond
and Bill Bain, 58-73 (Oxford: Butterworth-Heinemann, 1996), 58. See for instance, Business Roundtable,
Corporate Ethics: A Prime Business Asset (New York: Business Roundtable, 1988). 8 Stefanie Mauksch, “Beyond Managerial Rationality: Exploring Social Enterprise in Germany,” Social
Enterprise Journal 8, no. 2 (2012): 156. 9 H.C. Mruthyunjaya, Business Ethics and Value Systems (Delhi: PHI Learning, 2013), 8. 10 Mruthyunjaya, Business Ethics and Value Systems, 8.
An Ethical Rethinking of Workplace Surveillance
227
6.1.1 Defining Workplace Ethics and Workplace Surveillance Ethics
Workplace ethics is generally described as the application of moral principles, standards of
behaviour, or sets of values regarding proper individual and group conduct in the workplace.11 This
is a necessary but not sufficient understanding of workplace ethics.12 As a crucial part of employment,
it is an ingredient for the success of any organization. It aims to establish an ethical culture in the
workplace. According to Mark S. Schwartz, workplace ethics prescribes moral standards to guide
both employer (corporate) and employee behaviour. It goes beyond the applicable laws to their
foundations and the spirit in which they were written.13 An unaffected and unmanipulated
commitment to ethics is said to confer three sorts of benefits, namely: within the company, within
the business community, and in relation to the wider outside community.14 Commitment within the
company can improve workers’ morale, help resolve internal disputes and promote a healthy and
secure workplace, while among business communities such commitment can also improve the
reputation of a company and thus be an aid in raising venture capital and in defending the company
against allegations of impropriety.
Margaret et al. argue that committed individuals, both employers and employees alike, with proper
execution of ethical policies and practices, can increase workplace ethics in a corporate
environment.15 Analysing Kenneth R. Andrews’ work “Ethics in Practice,” Gagne et al. explain that
the formation of ethical members is the first step to creating ethical organizations, followed by
attention to the environment, promotion of a culture of sharing, and development of a well-defined
strategy, values and standards of conduct.16 It also has some practical benefits that are persuasive
within organizations as well as within the market and the wider community.17 The increased use of
common standards in all these regards has both diminished disputes and absenteeism and enhanced
corporate reputation and ability to raise venture capital.18 Many agree that it has fostered and
generated sustained profits and improved the credibility of management and companies in the
workplace.
11 Dean A. Bredeson and Keith Goree. Ethics in the Workplace, 3rd ed. (Mason, OH: South-Western Cengage
Learing, 2012), 15-25. 12 According to Johan Verstraeten, any applied ethics must include a narrative ethics and context along with a
good moral intention, right moral choice, right clarification of complex reality, etc. Narrative ethics points
out that “moral principles and ways of reasoning that have become separated from their ultimate narrative
frameworks become so abstract that either they retain little or no meaning, or they can be used at will as
sophisticated or rhetorical instruments to legitimize all types of interests.” So, the normativity of moral
principles is explained in recourse to the particular moral traditions and its meta-ethical significance. For,
“what binds persons is not the abstract idea of humanity or reason, nor the arbitrariness of individual
preferences or economical and technical efficiency, but the practices, codes, metaphors, symbols and
narratives that shape the society.” Johan Verstraeten, “Narrativity and Hermeneutics in Applied Ethics: Some
Introductory Considerations,” Ethical Perspectives 1, no.1 (1994): 51. 13 Mark S. Schwartz, “Universal Moral Values for Corporate Codes of Ethics,” Journal of Business Ethics 59
(2005): 27-44. Considering the three sources of workplace ethical codes, namely, corporate codes of ethics;
global codes of ethics; and the business ethics literature, Schwartz listed six main moral values relevant to
the workplace. They are respect, caring, trustworthiness, responsibility, citizenship and fairness. these values
are used as a foundation for workplace ethical behaviours. 14 Ronald D. Francis and Mukti Mishra, Business Ethics: An Indian Perspective (New Delhi: Tata McGraw
Hill, 2011), 31. 15 Margaret L. Gagne, Joanne H. Gavin and Gregory J. Tully, “Assessing the Costs and Benefits of Ethics:
Exploring a Framework,” Business and Society Review 110, no. 2 (2005): 181-190. 16 Gagne, Gavin and Tully, “Assessing the Costs and Benefits of Ethics,” 182. Cf. Kenneth R. Andrews, “Ethics
in Practice,” Harvard Business Review 67 (1989): 99-104. 17 Francis and Mishra, Business Ethics: An Indian Perspective, 40. 18 Francis and Mishra, Business Ethics: An Indian Perspective, 40.
An Ethical Rethinking of Workplace Surveillance
228
In the same way, workplace ethics addresses the interaction between the individual and the
organization. For instance, according to MaryJo Burchard, “if the organization’s values and ethics
are not compatible with the individual’s ethics, the likelihood of the person remaining in that
organization significantly decreases.”19 So the individual’s perception of the ethical orientation of a
company is very important and is strengthened when individuals and organizations both understand
themselves in an ethical context. A positive ethical culture and climate – both individual and
organizational – and establishment of a code of conduct for all in the organization produces
favourable organizational or business outcomes. Such a code of conduct is a code of ethics for use
in the workplace, and is defined as “a set of guidelines which are designed to set out acceptable
behaviours for members of a particular group, association, or profession.”20 It is also conceptualized
as “distinct, formal documents specifying self-consciously ethical constraints on the conduct of
organizational life.”21 Such a code, therefore, consists both of internal guidelines for all members of
the organization as well as statements of values and commitments about the organization’s external
relations. Following this, members of an organization act in a responsible manner and commit
themselves in a more ethical spirit during their work, improving the status and condition of
individual, organization and society more broadly.
An organization is not all about machines and tasks performed, but also about individuals, as persons,
who are its primary participants and contributors. In our view, therefore, ethics, as an overarching
framework consisting of a set of values and principles that measures individual and communitarian
behaviours, is the real foundation on which all actions in the organizational workplaces are and ought
to be based. Ethics concerns how an organization thinks about its members, and vice versa. Since
work is the means to some end22, work ethics concerns the value of that work and requires a
commitment on the part of all members of the organization in order to sustain that value. Work ethics
also consideres the moral benefit of work that enhances an individual’s character and the reputation
of the organization. Similarly, according to Khatijah Othman, “a strong work ethic is created from a
set of values based on commitment and diligence of the individual worker concerned.”23 Work ethics,
therefore, within organizations, refers to a reflective constellation of attitudes and beliefs pertaining
to work behaviour from multiple points of view.24 It seeks to identify acceptable moral behaviours
in the workplace and achieve individual well-being and corporate growth and development. In turn,
it aims to contribute to global prosperity and ensure the sustenance of all human kind.
Workplace ethics is used by organizations to refer to the framework by which they govern and control
employee behaviour, normalize or regulate the moral decisions of management, and protect the
organization from legal liability. In short, workplace ethics simply seeks to create an environment
where it is easier to do the right thing and avoid doing wrong in the workplace. It is therefore an
effort to systematically apply ethical principles and moral reasoning to various contexts, with due
attention to individual moral character, corporate strategies and values, and management practices in
the workplace. Human values, such as respect, responsibility, trustworthiness, fairness and caring in
19 MaryJo Burchard, “Ethical Dissonance and Response to Destructive Leadership: A Proposed Model,”
Emerging Leadership Journeys 4, no. 1 (2011): 154. 20 WiseGEEK, “What is a Code of Ethics?” http://www.wisegeek.com/what-is-a-code-of-ethics.htm [accessed
November 15, 2017]. 21 Gary R. Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” Business and Society
32, no. 1 (1993): 45. 22 Paul Heelas, “Work Ethics, the Soft Capitalism and the ‘Turn to Life,’” in Cultural Economy: Cultural
Analysis and Commercial Life, eds. Paul du Gay and Michael Pryke, 78-97 (London: Sage Publication, 2002),
78. 23 Khatijah Othman, “Work Ethics and Quality Workplace: An Observation from the Conventional and Islamic
Application,” ‘Ullūm Islamiyyah Journal 17 (2016): 81 24 Othman, “Work Ethics and Quality Workplace,” 85.
An Ethical Rethinking of Workplace Surveillance
229
the workplace, along with proper conduct that accords with certain standards of behaviour, helps
ensure that the objectives of the organization are accomplished. These values, indeed, distinguish
what is right and wrong within the workplace, where individuals are linked together as a community
of persons for a common purpose. In this sense, workplace ethics guides how people – employers
and employees – conduct themselves in every thought and act of their lives. It is the sum of the
expected and accepted forms of conduct or behaviour in the workplace in line with the contextual
application of universal ethical principles concerning the rights of people (privacy, autonomy,
freedom), justice or fairness to others (equality, non-discrimination), and respect for the worth, value
and dignity of human life.
To articulate a well-defined workplace surveillance ethics and an ethical response to workplace
surveillance is a herculean task, especially because it is not enough to simply apply a few guidelines
to a given context to determine whether an action is ‘ethical’ or not.25 Differnt contexts differ greatly,
and any simplistic approach will leave out several nuances in relation to justice and social relations.
However, one can readily identify a few of the key concerns related to employee surveillance: Has
the increased use of electronic surveillance in the workplace made employees more ethical, or rather
more fearful? Do employees do the right thing because of an inner motivation – a sign of their
intrinsic character – or only from fear of punishment or longing for reward? Who do surveillance
systems benefit, employers or employees? Are surveillance technologies implemented to develop
employee character, or to prevent the activity of wrongdoers? Can overt surveillance in the workplace
ever hope to monitor what is going on inwardly, in the minds of employees?
As previously discussed, one ethical concern is that all employees seem to become victims of
surveillance practices, since no one can escape from its snooping eye and “no one is completely
ethically spotless.”26 Another concern is that workplace surveillance is “heavily laden with the values
concerning the organization’s unquestionable right to control worker performance, by whatever
means.”27 This shows that workplace surveillance ethics is very important today, as it exposes a
certain mania for control in our time extended well beyond the proper regulative and corrective aims
of employee management. In our own view, it is important to comply with workplace surveillance
ethics especially because the practice of complete surveillance often is not a fair and just way to
control behaviour in work situations. One can relate ethical analysis of workplace surveillance to
dynamics of power control in the workplace as well as the legitimate aim to ensure employees’
privacy in the workplace. Another ethical concern is how to determine a measuring criterion for
proportionate surveillance, such as the advocates of workplace surveillance call for.
The drive to use automated surveillance in the workplace that goes beyond legitimate supervisory
intentions presents an ethical challenge, creating distance between employers and employees and the
possibility of discriminative behaviour on the part of management. Thus, we need to address and
assess both the effectiveness and intrusiveness of workplace surveillance in order to determine the
ethical permissibility of a given action. For employees, rather than being concerned primarily with
efficiency and productivity, are concerned with several other effects of this surveillance: its physical
and psychological intrusions, discriminatory practices through vested favouritism and health hazards
that may hinder their well-being and neglect their dignity as human beings. As Ball summarizes and
as we have already explored, there are wide range of ethical dilemmas to consider: “the extent to
25 Kirstie S. Ball, “Situating Workplace Surveillance: Ethics and Computer Based Performance Monitoring,”
Ethics and Information Technology 3 (2001): 211. 26 Mark S. Putnam, “Workplace Surveillance: Making You More Ethical or Just Scared?” Global Ethics
University, 2003, http://www.globalethicsuniversity.com/articles/workplacesurveillance.htm [accessed
February 20, 2018]. 27 Ball, “Situating Workplace Surveillance,” 214.
An Ethical Rethinking of Workplace Surveillance
230
which workers are entitled to a degree of privacy under surveillance […], the extent to which workers
are expected to sacrifice aspects of their mental and physical health when they come to work […],
the extent to which workers have the reasonable expectation of a meaningful and satisfying job […],
and the extent to which workers have the reasonable expectation of a level of ‘normal’ human
interaction during the course of the working day, rather than being treated like a machine.”28 Any
assessment of workplace surveillance ethics must consider these objectives and the concerns of
employees. The primary concern of workplace surveillance ethics is, therefore, how to balance the
perceived needs and interests of both employers and employees. Legalization can never fully address
ethical issues arising from workplace surveillance, as the nuances and effects of this practice are
complex and multidimensional. Therefore, we need to go beyond the legalistic rationality so common
in approaches to employee management and consider instead what moral principles and values will
be able to respond to these perceived challenges.
6.1.2 Beyond the Limits of Managerial Rationality
Managerial rationality is viewed, on the one hand, as purposeful and goal-directed, and on the other
as an ideological construct that functions to legitimize managerial control.29 Portrayed as a concern
for efficiency and thus the maximisation of profit, this form of bounded rationality has always been
used to legitimize management control over workers and often show the inconsistency of individual
acts in a given situation.30 Governance through managerial rationality looks for the most suitable
means to ensure business survival and progress by way of a close observation of financial figures
and indicators, steps to reduce risks and costs, and the development strategic action plans, etc.31 It is
a strategic management practice that aims to ensure the sustainability of an organization. However,
when the term management is applied to human beings in the same way as to machines, the
dimension of care for human beings disappears and the control principle becomes dominant. In line
with a Foucauldian concept of power relations, which we have illustrated in previous chapters,
managerial rationality consists in watching over and punishing, forgetting the actual handling and
training of human persons. Moreover, an exclusivist tendency is observed in many power-centred
managerial paradigms and in organizational behaviours. It leads to a neglect of other forms of
rationality that are required in an organization and in the organizational workplace.32 For all these
reasons, it is important to develop an ethical defense of the genuine concerns of human life and
conduct in the workplace.
Johan Verstraeten refers to ‘responsible moral behaviour,’33 which goes beyond a merely rational
choice approach in business. The value of business, he argues, is often reduced to shareholder “value”
(profit), with ethical considerations subordinated to this. Attention to human rights and moral values
28 Ball, “Situating Workplace Surveillance,” 214. Cf., Janice C. Sipior, Burke T. Ward and Sebastian M.
Rainone, “Ethical Management of Employee Email Privacy,” Information Systems Management 15, no. 1
(1998): 41-47; J. Lund, “Electronic Performance Monitoring: A Review of the Research Issues,” Applied
Ergonomics 23, no. 1 (1992): 54-58; and G. Stoney Alder, “Ethical Issues in Electronic Performance
Monitoring: A Consideration of Deontological and Teleological Perspectives,” Journal of Business Ethics
17, no. 7 (199): 729-743. 29 Stewart R. Clegg and James R. Bailey, eds., International Encyclopaedia of Organization Studies, Vol. 1
(Los Angeles: Sage Publications, 2008), 870. 30 Clegg and Bailey, International Encyclopaedia of Organization Studies, 871. 31 Christiane Gebhardt, “The Impact of Managerial Rationality on the Organizational Paradigm. Role Models
in the Management of Innovation,” Technology Analysis & Strategic Management 17, no. 1 (2005): 27. 32 Mauksch, “Beyond Managerial Rationality,” 166. 33 Johan Verstraeten, “Responsible Leadership beyond Managerial Rationality: The Necessity of Reconnecting
Ethics and Spirituality,” in Leadership and Business Ethics, ed. Gabriel Flynn, Vol. 25, 131-147 (Dublin:
Springer, 2008), 132.
An Ethical Rethinking of Workplace Surveillance
231
depends on market pressures, and thus ethical behaviour is caught in the clutches of this very modern
form of bounded rationality, to which a manipulative exercise of power is often linked.34 Verstraeten
criticises business ethicists who argue that amassing specialized (rational) knowledge can solve all
the problems of business life; he calls this an illusion. When managers are imprisoned within the
narrow hermeneutical horizon of modernity with its characteristic forms of manipulative rationality,
real innovation in moral behaviour becomes impossible. For “[b]usiness is not only a field dominated
by instrumental rationality, but also a dynamic field of human interaction.”35 Thus, one has to
acknowledge that organizations are complex institutions where different engagements and
possibilities for change are implied, and that it is human interaction that makes innovative behaviours
possible, in a business context as well as in any other.
In a similar way, Amartya Sen writes that “there would be some necessity to go beyond the
requirements of rationality in terms of permissive self-scrutiny, and to consider the demands of
‘reasonable conduct’ towards others.”36 He calls for serious attention to different perspectives and
socio-ethical and contextual concerns when taking choices and decisions. and for integrated ethical
behaviour in business organizations. However, managing business organizations in an ethical manner
is still a formidable challenge, for as John Drummond and Bill Bain rightly remind us, such a
behavioural pattern is “influenced by a myriad of individual and situational factors.”37 Researchers
in this perspective opine that along with individual personality traits and backgrounds of
socialization, organizational factors also influence the ethical behaviour of employees.38 Employers
must pay attention not only to the content of managerial rational rules, regulations and codes of
conduct, but also to (1) the process of determining that content;39 (2) the real and implied meanings
attached to it; (3) the circumstantial ingredients and factors; (4) employees’ participative
environment;40 and (5) the ethical rationality that goes beyond managerial rationality. Individual
ethical behaviour thus becomes the starting point for organizational ethical behaviour. Employers
who act only according to managerial rationality, disregarding the influence of individual ethical
reasoning, will be unlikely to promote pro-employee behaviours.
Ethics has to be an open, integrating and integrated force in workplace management. Upon and over
against the argument of some management theorists such as P.F. Drucker, who claims that “a special
ethics for business often harbour antibusiness sentiments,”41 Mark Pastin contends that:
Ethical considerations systematically remind the decision-maker of his or her basic goals, those
of co-workers, and, crucially, the company’s goals. These considerations forced the decision-
maker to rethink – and possibly reject of revise – basic assumptions about other employees at the
company, the company itself and the relationships between the company, its environment and the
decision-maker.42
34 Johan Verstraeten, “How Faith Makes a Difference: Business as a Calling or the Christians in Business,”
Estudios Empresariales 113 (2003/3): 56-57. 35 Verstraeten, “How Faith Makes a Difference,” 57-58. 36 Amartya Sen, The idea of Justice (London: Penguin Books, 2009), 197. 37 John Drummond and Bill Bain, eds., Managing Business Ethics (Oxford: Butterworth-Heinemann, 1996),
56. 38 Stead et al., “An Integrative Model for Understanding and Managing Ethical Behaviour,” 59-61. 39 Stead et al., “An Integrative Model for Understanding and Managing Ethical Behaviour,” 67. 40 Stead et al., “An Integrative Model for Understanding and Managing Ethical Behaviour,” 67. 41 Mark Pastin, “Ethics as an Integrating Force in Management,” in Managing Business Ethics, eds. John
Drummond and Bill Bain, 76-88 (Oxford: Butterworth-Heinemann, 1996), 76. Cf. Peter F. Drucker, “What
is Business Ethics?” Across the Board (October 1981): 22-32. 42 Pastin, “Ethics as an Integrating Force in Management,” 77.
An Ethical Rethinking of Workplace Surveillance
232
The adoption and integration of ethical considerations in the business and in the workplace, therefore,
can guide decision makers following securing the right and the good for all in the organization. This
creates pro-business sentiments, in fact, and not the opposite, as we will argue in the following
sections. However, Gael M. McDonald and Raymond A. Zepp suggest, referring to W. Bryson, ethics
in business has multiple layers and not a single meaning; it is not simply synonymous with common
sense, personal and organizational ideologies, philosophies or an adherence to religious ethics.43 This
means that, going beyond the misconception workplace ethics is simply a concern of religion or
theology,44 workplace ethics actually aims to establish a set of values that directly or indirectly
influence the activities of organization and workplace in a way that is not exclusively dependent on
religious claims. An embedded religious frame of reference in the workplace is explored towards the
end of this chapter.
Reflecting on the ethics and value systems of business enterprises in the Indian specifically, M.C.
Mruthyunjayan argues for the integration of three facets of ethos, namely: (1) the apparent and visible
social ethos, (2) the less visible professional ethos, and (3) the invisible personal ethos.45 He also
argues that ethics has a role to play that goes beyond juridical and legal perspectives and aims to
create an environment with strong ethos-based business and behavioural patterns. According to him,
[O]ne has to keep in mind that all business activities and eventualities cannot be totally ruled by
law. There should be something beyond law to govern corporate activities. And it is the human
judgement that comes to play at some critical times where the law has no specific answer or clue.
All societies emphasize that the human judgement, an embodiment of high reasoning, has to be
strong with good foundation of culture built on ethical value systems that ultimately guides people
in taking suitable decisions and actions.46
Every judgement in a business setting, therefore, must manifest an ethos that transforms the
workplace into a conducive home for people to work in, and thus it must explore new life-chances.
Consequently, ethics in business and in managerial behaviour requires both “nobility of the objective
or sincerity of the purpose” and the “integrity of implementation and practices.”47 As such, it can be
regarded as the embodiment of conscious concern for the rights and interests of all people concerned.
Considering business ethics, Mruthyunjaya identifies three different schools of thought.48 The first
prefers an ethics that seeks to conform with legal norms. The second has a different perspective and
standardises ethics to ensure the safety of all concerned in the workplace, both internal and external.
The third school understands ethics to be closely related to the subject of human morality and fuses
moral issues with business ethics.49 This third approach is significant for our discussion here, as it
strongly argues that “while law can only ensure maintenance of certain minimum performance
standards, it cannot accommodate anything beyond that whereas human morale demands much more
43 Gael M. McDonald and Raymond A. Zepp, “Business Ethics: Practical Proposals,” in Managing Business
Ethics, eds. John Drummond and Bill Bain, 196-210 (Oxford: Butterworth-Heinemann, 1996), 196. Cf. W.
Bryson, “The Meaning of Ethics in Business,” Business Horizons 20 (1977): 31. 44 Roslyn Frenz, “Definition of Workplace Ethics,” Bizfluent, September 26, 2017. https://bizfluent.com/about-
6677585-definition-workplace-ethics.html [accessed November 5, 2017]. 45 Mruthyunjaya, Business Ethics and Value Systems, 30. 46 Mruthyunjaya, Business Ethics and Value Systems, 31. 47 Mruthyunjaya, Business Ethics and Value Systems, 44. 48 Mruthyunjaya, Business Ethics and Value Systems, 47. 49 Mruthyunjaya, Business Ethics and Value Systems, 47-49. Mruthyunjaya explains that those holding legal
norms often argue that good ethics is the absence of a legal litigation and so a total compliance to legal norms
will ensure the moral/ethical performance in the organization and thus will have no ethical issues. In the same
way, safety is linked to ethics and then finally to human morale.
An Ethical Rethinking of Workplace Surveillance
233
from people than mere law abidance.”50 Mruthyunjaya further maintains that law provides a
foundation for accepted activities in the workplace, and must be followed not only in letter but in
spirit. He continues,
Even if an earnest attempt is made to make the law as exhaustive and comprehensive as practical,
there would always be something beyond the reach of the law. It is this area of beyond the reach
of the law where the extraordinary human qualities can play a significant role to save the humanity.
Unless the extra sensitive human mind innovates a superb personal ethical code of conduct driven
by the highest level of morale and steps in to lead the law beyond the apparent and/or visible
interceptions, scams and scandals cannot be totally erased from the surface of the business world
and the public life.51
Adherence to law is thus said to be the lowest common denominator of acceptable behaviour,
whereas ethics calls for a step beyond what is prescribed by law in situations of conflict. There will
be situations in the workplace where one needs to act in a way that reaches beyond the letter of rules
and regulations in order to understand the actual act, circumstances and intentions of the doer. For
instance, from CCTV footage and other data collected through monitoring, an employee may be fired
for taking frequent breaks during work. However, ethics demands that the authority probe further to
seek the actual reason why the employee is doing so, then act accordingly. Though adherence to law
is accepted as a basic prerequisite, then, one cannot hope to ensure total ethical security through law
alone. One needs rather to take the human ethos into consideration. In light of this recognition, we
may now look more closely at the corporate codes of ethics for workplace behaviours.
6.1.3 Corporate Codes of Ethics for Workplace Behaviour, and Beyond
The institutionalization of ethics in the codes of business organizations is perceived by researchers
to be a positive development, but there are significant differences between various codes and the
behavioural guidance they provide in the workplace.52 As Gary R. Weaver opines, “codes constitute
more than simple rational tools for achieving ethical organizational ends.”53 So, the distinction and
reservation of any particular behavioural standard amounts to a declaration that some requirements
are more important than others. Weaver continues in the same way, arguing that “[d]epending on the
circumstances of individual managers, organizations, industries, and societies, ethics codes – like
other organizational structures and activities – may have a variety of sources, roles and
consequences.”54 Codes of ethics have multiple roles to play in the workplace. Along with responding
to the demands and expectations of stakeholders in the organization and to other essential elements
of the broader business environment, such codes also respond to internal organizational dynamics
and promise to benefit all members of the organization.55 For employees, such codes establish
regulatory norms and practical guidelines for how to make an appropriate decision (that is good,
right, and fitting) when confronting legal and ethical dilemmas. According to Steven R. Barth, a code
of ethics, by indicating the vision, mission and guiding principles of the company, helps employees
act appropriately in individual cases and functions as an ethical compass in the workplace.56
Therefore, the purpose of codes of ethics in an organization or in the workplace is described as
50 Mruthyunjaya, Business Ethics and Value Systems, 49. 51 Mruthyunjaya, Business Ethics and Value Systems, 90. 52 Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” 45. 53 Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” 45. 54 Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” 47. 55 Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” 48. 56 Steven R. Barth, Corporate Ethics: The Business Code of Conduct for Ethical Employees (Boston, MA:
Aspatore, 2003), 8. Barth argues here that the cultural values created through these practices also create a
base for generating personal employee responsibility with ethical conduct.
An Ethical Rethinking of Workplace Surveillance
234
threefold: focusing at once on the company, on employees and on the environment.57 We will
consider each of these briefly.
Focusing first on the company, a code of ethics expresses the general values/philosophy of the
company, establishing and sustaining its particular culture by (1) identifying any unethical behaviour
directed against the firm or performed by it; (2) building trust and confidence within the firm; (3)
formulating a working strategy; (4) protecting the firm from legal action and liabilities: and (5)
evaluating its performance on a regular basis.58 It also leads to further environmental focus by
maintaining a good public image through mutual trust with other organizations and competitors and
satisfying external stakeholders.59 Moreover, as Barth observes, “implementing and enforcing an
effective corporate code of ethical business conduct will help improve […] employees’ self-esteem
and morale, making them happier and more productive.”60 It eventually enhances the reputation and
progress of organization. Codes of ethics are also viewed as “symbolic management tools, capable
of rationalizing or legitimizing organizational action regardless of the ultimate motive for or source
of those actions.”61 However, establishing a common norm or code for both employers and
employees to abide by is difficult, as it involves the conflicting interests of various stakeholders.
To resolve this issue, Schwartz identifies a set of universal moral values for use in formulating a
common corporate code of ethics.62 Schwartz justifies the use of universal moral values, quoting and
discussing Thomas L. Beauchamp and Norman E. Bowie, who illustrate that “there is a common
morality that all people share by virtue of communal life and this morality is ultimately the source of
all theories of morality […] it is applicable to all persons in all places, and all human conduct is
rightly judged by its standards.”63 The identification and adoption of universal values here is meant
to establish a moral authority. Nevertheless, referring to Sandra Waddock’s accounts on corporate
citizenship, Schwartz points out that “the existence of universal core moral values does not
necessarily imply that they will be followed or put into practice.”64 It must follow detailed and
definite training and guidance to be actualized or put into practice in specific situations through
workplace behaviours and decision-making processes. What is important for our present research is
its primary focus on deterring unethical practices and behaviours by employees. For the code of
ethics makes clear the seriousness of a company’s commitment to ethical business conduct and the
expected behaviour of employees of the company.65 Furthermore, a code indicates the obligations of
employees to the company and vice versa, and by providing moral guidance to both employers and
employees, it promises to improve workplace morale and regulate employee behaviour.66 It also aims
to guarantee the psycho-social well-being, health and safety of all members of the organization and
57 Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” 49. 58 Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” 49. 59 Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” 49. 60 Barth, Corporate Ethics: The Business Code of Conduct for Ethical Employees, 8. According to Barth, a
proper adoption and timely adaptation of code of ethical conduct in business will enable the organization “to
create a cohesive culture of doing the right thing for the right reasons. […] As a result, your code of conduct
can lead to more and better business for your company – business with fewer risks or recrimination or
liability.” Barth, Corporate Ethics: The Business Code of Conduct for Ethical Employees, 8. 61 Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” 47-49. 62 Schwartz, “Universal Moral Values for Corporate Codes of Ethics,” 27-44. 63 Schwartz, “Universal Moral Values for Corporate Codes of Ethics,” 39. Cf. Tom L. Beauchamp, and Norman
E. Bowie, Ethical Theory and Business, 7th ed. (Upper Saddle River, NJ: Pearson/Prentice Hall, 2004), 33-
34. 64 Schwartz, “Universal Moral Values for Corporate Codes of Ethics,” 41. Cf. Sandra Waddock, “Creating
Corporate Accountability: Foundational Principles to Make Corporate Citizenship Real,” Journal of Business
Ethics 50, no. 4 (2004), 323. 65 Barth, Corporate Ethics: The Business Code of Conduct for Ethical Employees, 9. 66 Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” 49.
An Ethical Rethinking of Workplace Surveillance
235
reduce occupational risks in several ways: by treating employees with respect, justice and dignity,
and by understanding their socio-cultural concerns without discrimination. A code of ethics
therefore, in short, aims to recognize and promote the individual and social rights and duties of
employees in the workplace.
There is a chance, however, that a code of ethics may itself become a form of control and supervision;
that a company may promote normative principles for the sake of profit alone rather than for the sake
of ethical behaviour in itself.67 For instance, informed consent and job relevance are two factors often
cited to justify employee surveillance in the workplace, as we have noted above. This may be part of
the contract signed by employees and become a part of the company’s codes of ethics. In what
manner is consent acquired, however, or how do employees agree to this? If it is done through a
forced contract, or marked by fear of punishment or fear of losing one’s job, is a matter of serious
concern that we will have to explore further. These limits of informed consent – to what extent it is
informed, and in what manner it is secured –also shows the need to go beyond mere normativity to
a further, ethical realm where conduct is truly unmanipulated. In the same way, is the relevance of
the practice of employee surveillance in a particular situation, time and place, and the gravity of its
implementation all raise further questions. A further challenge is that an organization or firm may
create codes of ethics using its own framework, and thus manipulate stakeholders who may be unable
to distinguish between the symbolic value of the code from its reality, or its apparent role from its
intended role.68
The increasing socio-economic diversity and multi-cultural background of the modern workforce
determines in many cases employees’ understanding of and receptivity to codes of ethics. Their
understand and receptivity will depend on a employee’s individual (personal) and cultural (traditions,
ethos and practices) views and own judgements of what is ethical or unethical in a given scenario.69
For instance, Weaver points out that “[j]ust as top management can see quality circles and
participative management as empowering workers while some workers see them as forms of co-
optation, so codes may function as ethically-oriented tools in the eyes of management but as
oppressive devices to other organization members.”70 Therefore, although codes of ethics can
function as an ethical or moral compass for an entire workforce, if it is not implemented and used
appropriately and justly, by sometimes going beyond the letter of the code to act in accordance with
its spirit, it may become an oppressive tool for employees. Before entering the discussion on an
adequate ethical approach and response to this phenomenon of workplace surveillance, we will
consider briefly is the need to integrate different ethical theories in the moral assessment of
workplace surveillance.
6.1.4 The Integration of Ethical Theories as Prerequisite for Moral Assessment
The integration of ethical theories is a prerequisite for any adequate assessment of decision making,
given that there can and will be more than one reason to act in a certain manner (ethically) in each
situation. As J. Thomas Whetstone illustrates, there are different reasons why a person will choose
one ethical theory over another and justify a course of action he or she has undertaken in a particular
way. For any given action, Whetstone argues, “[m]oral reasons can include both the duty to act and
the consequences expected from the act as well as the belief that so acting is characteristic of the
67 Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” 50. 68 Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” 50. 69 Barth, Corporate Ethics: The Business Code of Conduct for Ethical Employees, 7. 70 Weaver, “Corporate Codes of Ethics: Purpose, Process and Content Issues,” 51.
An Ethical Rethinking of Workplace Surveillance
236
kind of person one wants to be.”71 He urges ethicists therefore to combine various theories and
approaches to achieve a proper balance and produce a better assessment. The consideration of various
approaches helps us, in fact, to determine the standards of behaviour that can be considered ethical
in a given circumstance. However, to act ethically and to make ethical decisions, we need “a trained
sensitivity to ethical issues and a practiced method for exploring the ethical aspects of a decision and
weighing the considerations that should impact our choice of a course of action.”72 Hence, we need
an integrated framework to deal ethically with an issue that pertains to everyday life.
Privacy, as we can see in the pronouncement of the Victorian Law Reform Commission, is most
fundamentally related to the most intimate aspects of being human.73 Here, primary focus is given to
the right of the individual to choose for him or herself. The dignity of employees in the workplace,
based on their ability to choose freely what they will do with their lives, and their fundamental moral
right to have these choices respected, makes them different than the other “resources” an organization
may possess. Employees are not objects to be manipulated, and when something is done in ways they
do not freely chose, their human dignity is violated.74 Therefore, the Rights Approach that affords
employees the right to make their own choices, to be told the truth, and not to have their freedom
interfered with, shows employee surveillance to be unethical, since it strips the employee of many
rights. For example, as the rights approach implies, an employer who purposefully omits pertinent
information and does not duly inform the employee of the company’s policy on monitoring, acts
unethically. 75
Even in virtue ethics, which conceives of morality in relation to concepts of character including
honesty, fairness, compassion and generosity, privacy can be considered a right that employees
deserve and ought to have. For by implementing this ethical guidance, a company shows its belief
that “workers know how to act and display themselves with great character [and] therefore,
surveillance is unnecessary because employees’ behaviour and decisions will be consistent with the
actions of a ‘good’ person.”76 When employees are accorded the freedom to make their own
decisions, based on virtue ethics’ concept of character development, and assuming they make good
choices both for the individual and the company, this increased responsibility raises morale and
improves performance.77 For example, employees subject to electronic surveillance, and particularly
e-mail monitoring, have reported feelings decreased trust in their employer, increased stress, and
subsequently decreased productivity. However, relying on the good character of employees seems to
71 J. Thomas Whetstone, “How Virtue Fits within Business Ethics,” Journal of Business Ethics 33 (2001): 102.
Whetstone has illustrated an example in this regard that “one might refrain from cheating because this is the
right way to act, and because so acting will crate a better world, and because one is an honest person.”
Whetstone, “How Virtue Fits within Business Ethics,” 102. 72 Manuel Velasquez et al., “A Framework for Thinking Ethically,” Markkula Center for Applied Ethics,
https://www.scu.edu/ethics/practicing/decision/framework.html [accessed March 12, 2014]. 73 Jan Holvast, “History of Privacy,” in The History of Information Security: A Comprehensive Handbook, eds.
Karl de Leeuw and Jan Bergstra, (Amsterdam: Elsevier, 2007), 739. See also “Workplace Privacy,” Victorian
Law Reform Commission, Issues Paper, 18.
http://www.lawreform.vic.gov.au/sites/default/files/IssuesPaperfinal.pdf [accessed March 10, 2014]. 74 Manuel Velasquez et al., “Thinking Ethically: A Framework for Moral Decision Making,”
http://www.scu.edu/ethics/practicing/decision/thinking.html [accessed March 12, 2014]. 75 Michael Bassick, Tyler McNamara, and Deborah Sullivan. “Employee Surveillance: An Ethical
Consideration,” in The Ethical Imperative in the Context of Evolving Technologies, eds. Michel Bassick et
al. (Boulder, Colorado: University of Colorado, 2007), 81. 76 Bassick, “Employee Surveillance: An Ethical Consideration,” 82. 77 Barry A. Friedman and Lisa J. Reed, “Workplace Privacy: Employee Relations and Legal Implications of
Monitoring Employee E-mail Use,” Employee Responsibilities and Rights Journal 19, no. 2 (2007): 80.
An Ethical Rethinking of Workplace Surveillance
237
improve productivity and instil confidence.78 In this regard Stanley Been, in his article ‘Privacy,
Freedom and Respect for Persons,’ writes:
[T]o conceive someone as a person is to see him as actually or potentially a chooser, as one
attempting to steer his own course through the world, adjusting his behaviour as his apperception
of the world changes, and correcting course as he perceives his errors. It is to understand that his
life is for him a kind of enterprise, like one’s own [. . .]. To respect someone as a person is to
concede that one ought to take account of the way in which his enterprise might be affected by
one’s own decisions. By the principle of respect for persons, then, I mean the principle that every
human being, insofar as he is qualified as a person, is entitled to this minimal degree of
consideration.79
To conceive and respect someone as a person preserves their individual human dignity and increases
mutual trust. Here, employers are called to “respect their employees’ personal dignity and integrity
by allowing them sufficient autonomy to function without constant and ubiquitous supervision and
inspection of their work and personal lives.”80 Moreover, the rights approach grants employees
certain inalienable rights, including rights to freedom and privacy that, regardless of the situation, an
employee as an individual still owns. When the employee is subject to extreme scrutiny through
electronic surveillance, he or she is treated in an unethical manner.81 The same concern arises, for
instance, in the case of Radio Frequency Identification, the effects of which have been discussed in
the first chapter. Although this system of marking is said to be very useful, in that is allows the
employer to know how long the employee spends time at the desk or in the break room, it is also
unethical, for it is an unwarranted means of observation that invades the physical and personal
privacy of employees.82 It is also clear that electronic surveillance by way of video, phone, and
internet monitoring in the workplace can distort and reduce personal autonomy by interfering with
the motivational attitudes, creativity, spontaneity and other executive capacities of employees.83
Finally, one’s growth in work and in life must be accompanied by growth in moral reasoning or
ethical thinking, which will increase one’s sense of responsibility to maintain these natural rights of
autonomy and privacy. Integrating several ethical approaches, such as the rights approach, virtue
ethics approach, etc., gives us an authentic understanding of how one can think or act in certain
circumstances.
6.2 CLASSICAL APPROACHES OF ETHICAL REASONING AND THEIR RELEVANCE FOR
WORKPLACE SURVEILLANCE
Though this study generally examines electronic surveillance in the workplace as an issue dominated
by ethical questions and concerns, Kirstie S. Ball rightly observes that “any investigation of ethical
monitoring practice is inadequate if it simply applies best practice guidelines to any one context to
78 Bassick, “Employee Surveillance: An Ethical Consideration,” 84. 79 Stanley I. Benn, "Privacy, Freedom and Respect for Persons," in Philosophical Dimensions of Privacy: An
Anthology, eds. James Roland Pennock and John William Chapman (Cambridge: Cambridge University
Press, 1984), 8-9. 80 Frank J. Cavico, “Invasion of Privacy in the Private Employment Sector: Tortious and Ethical Aspects,”
Houston Law Review 30 (1993): 1345. 81 Bassick, “Employee Surveillance: An Ethical Consideration,” 85. 82 Alan R. Peslak, “An Ethical Exploration of Privacy and Radio Frequency Identification,” Journal of Business
Ethics 59 (2005): 327-345. 83 Emma Rooksby and Natasha Cica, “Personal Autonomy and Electronic Surveillance in the workplace,” in
Electronic Monitoring in the Workplace: Controversies and Solutions, ed. John Weckert (Hershey: Idea
Group Publishing, 2005), 252.
An Ethical Rethinking of Workplace Surveillance
238
indicate, whether practice is, on balance, ‘ethical’ or not.”84 Therefore, such an investigation must
aim to integrate ethical principles and practices, consisting of moral behaviour and character
formation. Such an investigation must also examine how different means of technological
surveillance in the workplace, if not rightly understood, can be detrimental to organizational
motivation and social commitment. It is important to understand employee monitoring in relation in
an ethical manner in order to understand clearly the dilemmas it poses, particularly with respect to
the issue of privacy. Any ethical analysis must exhibit respect and regard for the basic rights of the
individuals concerned and must also consider culturally inherited differences held as moral
standards.85 However, ethics is not simply a matter of following accepted cultural norms and laws;
rather, it proposes more universal standards of behaviour that humans ought to adhere to.86
Teleological and deontological approaches have already been discussed in this regard in the first
chapter. The four main ethical approaches, namely “the virtue ethics approach, the utilitarian
approach, the fairness approach, and the common good approach,”87 cannot individually provide an
adequate and thorough solution to a problem situation in the workplace, where people are gathered
together as one collectivity even though they have different ethnic, cultural, religious, political and
economic backgrounds.
Consequentialism, another ethical theory, argues for the avoidance of adverse consequence or harm
to anyone, holding that an action is ethical “only if the outcome remains totally good and good in all
respects.”88 In this view, the ends can indeed justify the means. With respect to workplace
surveillance, from a consequentialism standpoint, any means to monitor employees can be
implemented provided that it achieves the objectives of the organisation and fulfils its intended goals.
This position has been much criticised. However, in recent years there has been an increase in the
popularity of utilitarianism. According to Mollie Painter-Morland, utilitarianism embraces whatever
works best, and management determines its course of action based on a cost-benefit analysis, seeking
an optimal outcome.89 The number of beneficial effects of an action are given more importance here
(the greatest good for greatest number)90 and many management decisions are made on this basis.
84 Kirstie S. Ball, “Situating Workplace Surveillance: Ethics and Computer Based Performance Monitoring,”
Ethics and Information Technology 3 (2001): 211. 85 Bahaudin G. Mujtaba, “Ethical Implications of Employee Monitoring: What Leaders Should Consider,”
Journal of Applied Management and Entrepreneurship.
See, http://www.huizenga.nova.edu/Jame/articles/employee-monitoring.cfm [accessed March 10, 2014]. 86 According to Velasquez ethics is not a feeling and not confined to any religion, nor is it the same as religion.
Being ethical is not same as following the law. It refers primarily to “the well-founded standards of right and
wrong that prescribe what humans ought to do, usually in terms of rights, obligations, benefits to society,
fairness, or specific virtues, [and] includes that enjoin virtues of honesty, compassion, and loyalty.” Manuel
Velasquez et al., “What is Privacy?” Markkula Center for Applied Ethics
https://www.scu.edu/ethics/practicing/decision/whatisethics.html [accessed March 12, 2014]. 87 George Reynolds, in his book ‘Ethics in Information Technology’ explains these approaches in a nutshell as
follows: “The virtue ethics approach is the ethical choice that best reflects moral virtues in yourself and your
community. The utilitarian approach is the ethical choice that produces the greatest excess of benefits over
harm. The fairness approach is the ethical choice that treats everyone the same and does not show favouritism
or discrimination. The common good approach is the ethical choice that advances the common good.” George
Reynolds, Ethics in Information Technology (Boston, MA: Thompson, 2003), 20. 88 Mruthyunjaya, Business Ethics and Value Systems, 207. 89 Mollie Painter-Morland, Business Ethics as Practice: Ethics as the Everyday Business of Business
(Cambridge: Cambridge University press, 2011), 53. John Stuart Mill, however, has further described a kind
of utilitarianist ideology that goes beyond pleasure-pain calculus. By bringing a gradation in the kinds of
pleasures that one experiences and looks for, he argues, some are qualitatively better than others and the
benefit to the individual in turn serves also to maximise the well-being of the broader community. He terms
it as social well-fare utilitarianism. John Stuart Mill, Utilitarianism (Montana: Kessinger, 2004); Painter-
Morland, Business Ethics as Practice, 53. 90 Mruthyunjaya, Business Ethics and Value Systems, 208-209.
An Ethical Rethinking of Workplace Surveillance
239
However, this theory has been extensively criticised due to the risk it seems to pose of objectifying
people, given its instrumental moral orientation.91 In the same way, business practitioners may
rationally justify the harmful consequences of a particular action by pointing to other benefits that
outweigh them. Such an approach may encourage the rationalization of unethical behaviour, or a
belief that the end can justify the means.92 Establishing a noble path to achieve good ends should also
be of concern to business ethicists.
Unlike determining the morality of an action by reference to its anticipated consequences, non-
consequentialists look for well-reasoned moral principles and argue that “moral imperatives should
be formulated in an objective, rational and impartial manner.93 Moral theories of deontology, closely
associated with the work of Immanuel Kant and the rights-based approach of John Rawls, are
exemplary of this appraoch. Kant’s deontology looks for a priori reasoning in moral assessment,
utilizing the human capacity for reason, and specifically practical reason. Referring to this Kantian
notion of pure practical reason, business ethicists often, as Painter-Morland noted, employ this kind
of a priori reasoning to formulate moral maxims to guide their actions and decisions.94 Moral duties,
for Kant, are categorical imperatives and have universal applicability and indisputable normative
force.95 Though context remain important for Kant, here he is concerned with the universal
application of these imperatives. This will be further explained in the next sub-section.
At this juncture, it is important to draw attention to Painter-Morland’s claim that although moral
reasoning or the ability to reason is essential to moral agency, as many business ethicists allow,96 it
is unlikely that business ethicists or managers will make decisions that are wholly without reference
to self-interest in this capitalist-economy world.97 It is noted that the objective reasoning and rights
of employers in the organization (security, safety, liability alleviation, etc.) may contradict the rights
of the employees (privacy, autonomy, fair treatment, etc.). This approach has also been criticised, on
the one hand, for being internally inconsistent, since one cannot ignore the potential consequences
of an action, and on the other hand for relying on a merely instrumental principle to secure a desirable
end.98 Thus there are some limitations to this approach in the context of workplace surveillance, for
example the collection of more employee data than what is required for a purpose (function creep),
third party access to the information, and the future manipulative use of the data with vested interests.
John Rawls’ idea of justice as fairness likewise addresses social inequalities in the context of business
morality, by which he describes the principles of liberty and equality in the conception of justice.99
The example of social sorting, in which employees are categorized according to their worth or risk
on the basis of monitored data, could be understood along these lines. Rawls wanted to correct for
the bias created by social position and power interests and prevent this from influencing moral
judgements. Thus, he begins his theory from behind a hypothetical ‘veil of ignorance’ designed to
91 Painter-Morland, Business Ethics as Practice, 53. 92 Painter-Morland, Business Ethics as Practice, 53. 93 Painter-Morland, Business Ethics as Practice, 55. 94 Painter-Morland, Business Ethics as Practice, 56. Cf. Immanuel Kant, Groundwork of the Metaphysics of
Morals, ed. & trans. Allen W. Wood (New Haven: Yale University Press, 2002). 95 According to Kant, “[t]he categorical imperative would be that one which represented an action as
objectively necessary for itself, without any reference to another end.” Kant, Groundwork of the Metaphysics
of Morals, 31. 96 For instance, Norman Bowie, Kantian Business Ethics (Malden: Blackwell, 1999), 45. 97 Painter-Morland, Business Ethics as Practice, 59. Self-interest is not intrinsically bad either. 98 Painter-Morland, Business Ethics as Practice, 59-60. 99 John Rawls, “Justice as Fairness: Political not Metaphysical,” Philosophy and Public Affairs 14 (1985): 223-
251. Cf. John Rawls, Justice as Fairness: A Restatement, ed. Erin Kelly (Cambridge: Harvard University,
2001).
An Ethical Rethinking of Workplace Surveillance
240
ensure that all parties select principles of justice proper for a fair society.100 He argued for equal
rights for all members of a society, where the least advantaged are benefited and not forgotten.
According to Painter-Morland, in a business context, ethicists such as Edwin Hartman have used
Rawls’s theory to establish principles of organizational justice since it enables people to forumulate
a fair institutional dispensation in freedom and equality, and thus accepts the plurality of moral
theories applicable in a business context.101 However, these principles for fair business have been
criticised as vague and too general, with too little attention to context. For instance, there are
stakeholders with different interests, and the balancing of these interest is not done according to a
principle of equality, but according to the purpose of particular interactions in the organization.102
Virtue ethics is also often held to complement deontological or consequentialist formulations of
moral reasoning.103 Virtue is said to be a qualitative characteristic within a person – a character
disposition. According to Dennis Wittmer and Kevin O'Brien, “virtue is a quality or excellence that
makes a thing good according to its nature, and moral virtues (versus intellectual virtues) are those
qualities that make a person morally or ethically excellent.”104 Whetstone defines a virtuous act as a
“rational act based on a wise, purposeful assessment of the factual situation, chosen for a pure motive
and consistent with a steady disposition of the actor’s character.”105 Virtues are, therefore, not only
a primary disposition to act, but also a habit of acting on the basis of that predisposition. This is an
internal practice and gives rise to internal goods.106 In the context of workplace surveillance, virtue
ethics is significant as a means of character formation, moral education and proper training of
employees, are notably affect their behaviours and responses both in general and in particular
situations. If theft and fraudulent activities continue in the workplace after implementing electronic
systems to monitor employees and control and regulate them, the virtue approach seeks to transform
the qualitative characters of the perpetrators.
However, each of these above-mentioned approaches is limited in one way or another, as George
Reynolds explains:
[S]ince the definition of virtue cannot be worked out objectively it doesn’t provide much of a
guide for action and it depends on the circumstances – you work it out as you go and also each
one’s culture and cultural norms may also dictate what is right or wrong in a situation. Since
measuring or comparing the values of certain benefits and costs is difficult in some situations the
utilitarian approach alone is also complicated and insufficient. The influence of the personal bias
makes the fairness approach incompetent to solve the issue. When people have clearly different
100 Painter-Morland, Business Ethics as Practice, 63. 101 Painter-Morland, Business Ethics as Practice, 65. Cf. Edwin Hartman, Organizational Ethics and the Good
Life (Oxford: Oxford University Press, 1996). 102 Painter-Morland, Business Ethics as Practice, 66. Iris Marion Young also, through her feminist political
thought, criticises in the same way arguing the particularity of situations. Cf. Iris Marion Young, Justice and
the Politics of Difference (Woodstock: Princeton University Press, (1990) 2011). 103 Whetstone, “How Virtue Fits within Business Ethics,” 102. 104 Dennis Wittmer and Kevin O'Brien, “The Virtue of “Virtue Ethics” in Business and Business Education,”
Journal of Business Ethics Education 11 (2014): 3. 105 Whetstone, “How Virtue Fits within Business Ethics,” 104. Referring to the Aristotelian explanation of the
ethic of virtue, Whetstone sees virtue ethics as personal – more fundamental to persons, as focusing on the
motivations of the actor, as context oriented, and complementing to other discipline of human behaviour.
Whetstone, “How Virtue Fits within Business Ethics,” 105-106. 106 Alasdair MacIntyre, After Virtue: A Study in Moral Theory, 3rd ed. (Notre Dame: University of Notre Dame
Press, 2007), 149.
An Ethical Rethinking of Workplace Surveillance
241
ideas about what constitutes common good the consensus cannot be easily made and in addition
to that maintaining the common good often requires some groups to bear great costs than others.107
Despite the limitations of these approaches, they remain important factors in assessing various issues
of privacy and social sorting in the workplace. Hence, these approaches help to define what standards
of behaviour can be adopted. To consider these issues in the workplace, therefore, we need to take
an integral approach and seek to harmonize the ethical norms and principles noted above in order to
find a better solution.
6.2.1 A Tripartite (Eclectic) Reading of Workplace Surveillance
In our effort to explain and respond ethically to workplace surveillance using a tripartite approach,
which we will call an “eclectic” approach, we will draw on a recent study on electronic surveillance
by Jonathan P. West and James S. Bowman. For West and Bowman, surveillance “is common, takes
many forms, and embodies not only abstract rights in conflict but also sparks debate in practice […]
used for a variety of reasons, and is likely to be most efficacious when employer and employee rights
are carefully weighed.”108 Therefore, following West and Bowman, a tripartite eclectic approach will
be valuable because it combines different models and promises to illuminate the behavioural
perspectives and decision making process in a given situation. This analysis is tripartite in that it
includes three dominant schools of thought, and it is eclectic in that it tries to derive a well-grounded
position with regard to workplace surveillance from a broad and diverse range of sources. This
response is based on a combination of (1) the expected result of an action (consequentialism or
teleology); (2) the application of pertinent rules (duty ethics or deontology); and (3) personal
character (virtue ethics).109 By analyzing these considerations and integrating them in an ethical
triangle of perspectives, as West and Bowman envision, a balanced defensible evaluation of
workplace surveillance is expected.
Firstly, we employ the result-based perspective or cost-benefit [utilitarian] approach, as it seeks the
greater utility/good for the maximum possible number of employees. As we have discussed and
explored in previous chapters, the background literature and arguments in support of surveillance
include productivity, security, risk management, protection against fraudulent acts, liability
alleviation, the assurance of quality, data protection, and so forth.110 For instance, monitoring is
expected to increase individual work capacity, enhance performance and improve the assessment of
employee behaviour by increasing organizational control and managerial resources.111 Besides, in
the view of a few researchers like Marylène Gagné and Devasheesh Bhave, surveillance improves
the performance of employees when it supports personal autonomy, by which it seems to serve the
interests of both organization and workforce alike.112 However, as West and Bowman rightly
107 Reynolds, Ethics in Information Technology, 21-22. 108 Jonathan P. West and James S. Bowman, “Electronic Surveillance at Work: An Ethical Analysis,”
Administration & Society 48, no. 5 (2016): 631. 109 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 631-641. 110 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 634; Al-Rjoub et al.,
“Electronic Monitoring: The Employees Point of View,” 190; Sewell and Barker, “Coercion versus Care,”
939; Mujtaba, “Ethical Implications of Employee Monitoring,” 34; Kirsten E. Martin and R. Edward
Freeman, “Some Problems with Employee Monitoring,” Journal of Business Ethics 43, no. 4 (2003): 353-
361; and Allen et al., “Workplace Surveillance and Managing Privacy Boundaries,” 186. 111 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 634. 112 Marylène Gagné and Devasheesh Bhave, “Autonomy in the Workplace: An Essential Ingredient to
Employee Engagement and Well-Being in Every Culture,” in Human Autonomy in Cross-Cultural Context,
ed. Valery I. Chirkov, Richard M. Ryan, Kennon M. Sheldon (New York: Springer, 2011), 163-187. West
and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 634; and Roland E. Kidwell, “Loafing
An Ethical Rethinking of Workplace Surveillance
242
observe, many of its advocates argue that surveillance is beneficial or at least necessary, but with
various conditional clauses. We read, for example, in West and Bowman, “[a]s long as surveillance
is for a legitimate business purpose and personnel have consented to monitoring, it can safeguard
both organizational security and employees. […] Organizations are entitled to conduct surveillance
for business reasons so long as it is not unduly intrusive.”113 It is accepted, therefore, if at all, with
certain conditions that again put in question its legitimacy. The inadequacy and limitedness of such
arguments in terms of job relevance and informed consent is analysed below, in light of the example
of the privacy argument.
Surveillance negatively affects “the employment relationship giving more power to employers as
organizations regard control of the workplace as a management prerogative.”114 It also shows that
when those holding the power act with utilitarian instrumental principles, employees are objectified
and treated as means to some end, made to act as arbiters of authorities’ profit and pleasure.115 In the
same manner, as our previous discussion demonstrates, surveillance goes beyond what is reasonable
and exhibits “function creep,” where increasingly “all-seeing” technologies control and spy on
employees and are used as a kind of “electronic whip” by which managers increase the pace of
work.116 Besides, over against productivity enhancement claims, this research shows that the anxiety,
depression, stress, and physical and nervous disorders that result from surveillance adversely impact
employee health and lead to decreased productivity. Moreover, behavioural tendencies like fear,
distrust, suspicion, resentment, hostility, violence and anti-social activities are alarmingly increased,
morale and motivation are decreased, and job dissatisfaction leads to higher rates of turnover, burnout
and absenteeism.117 West and Bowman rightly point out in this regard that “[w]hen monitoring
backfires, it can result in resistance, non-compliance, and retaliation.”118 All these in fact seem to
deteriorate and worsen the productivity of employees in the long run.
Through these ever-present monitoring practices, employees lose their autonomy, creativity and
freedom, for a fear of punishment causes them to think and act according to the requisites of an actual
or virtual observer. Likewise, along with West and Bowman, this research also shows the advantages
of safeguarding employee rights and interests by using the same measures mentioned above. The
invasion of privacy, for instance, emerges as the most significant individual and social issue when
surveillance is concerned.119 A whole chapter has been dedicated to exploring the violation of
in the 21st Century: Enhanced Opportunities – and remedies – for Withholding Job Effort in the New
Workplace,” Business Horizons 53 (2010): 543-552. 113 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 635. Cf. Martin K. Riedy and
Joseph H. Wen, “Electronic surveillance of Internet Access in the American Workplace,” Information and
Communication Technology Law 19, no. 1 (2010): 87-99; Nancy Flynn, The e-Policy Handbook: Rules and
Best Practices to Safely Manage Your Company's E-Mail, Blogs, Social Networking, and Other Electronic
Communication Tools, 2nd ed. (New York: American Management Association, 2009); Kendra Rosenberg,
“Location Surveillance by GPS: Balancing Employer’s Business Interest with Employee Privacy,”
Washington Journal of Law, Technology & Arts 6, no. 2 (2008): 145-154. 114 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 636. 115 Painter-Morland, Business Ethics as Practice, 54. 116 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 636. Cf. Ball, Workplace
Surveillance: An Overview, 93. 117 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 636; Kizza and Ssanyu,
“Workplace Surveillance,” 12-14. See also Zweig, “Beyond Privacy and Fairness Concerns,” 102; Stanton,
“Traditional and Electronic Monitoring from an Organizational Justice Perspective,” 130-134; Simpson and
Byrski, “The 21st Century Workplace,” 22; and Ciocchetti, “The Eavesdropping Employer,” 285-369, 357. 118 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 636. 119 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 637; Spinello, John Gallaugher
and Sandra Waddock, “Managing Workplace Privacy Responsibly,” 74-97; Solove, Understanding Privacy,
1-5.
An Ethical Rethinking of Workplace Surveillance
243
employee privacy in the workplace, and proves that unrestricted privacy in any forms deprives
employees of their basic human rights. Therefore, from a results-oriented perspective, constant
surveillance in the workplace is a threat (physical, moral, psychological, and behavioural) to the
individual ethical rights of employees (rights to freedom, autonomy and privacy) and from an
employee perspective is an unethical managerial practice.
Secondly, we may consider the rule-based perspective, as ethical rules help professionals follow and
abide by the ethical principles and precepts found in constitutional, federal, and other organizational
or corporate regulations, rules and reservations. This perspective holds that, notwithstanding the
projected or predicted consequences/result, certain actions are in every case right or wrong. It argues
that “[w]hat is right is what conforms to moral rules; one must see one’s duty and do it.” In deciding
what rule to apply, the person considers, “what is good for one is good for all”120 in specific situations.
Workplace surveillance is analyzed here based on principles of social justice and fairness and in view
of rule-based duty and legal-ethical responsibilities. Supporters of workplace surveillance from this
perspective look for the fair treatment of employees in accordance with an established management
practice. They may argue that if “properly designed and implemented, surveillance promises fairness
and objective administration of the employer-employee contract, ensuring procedural and
distributive justice.”121 Surveillance is thus regarded as a means both for the promotion of mutual
respect and fairness and for more objective, fact-based feedback and performance appraisal. The
view is not without its problems, however, and these are discussed in the following.
An understanding and application of legal frameworks for surveillance is an area that exceeds our
scope here and requires another platform of research. For “the expansion and proliferation of
technology has dawned a new era, blurring the preconceived boundaries, and surfacing new issues
in which [...] the moral, legal, and social principles that once helped guide ethical decision making
are no longer sufficient, resulting in a variety of practices which accelerate the emergence of ethical
dilemmas.”122 What an employer and employee consider ethical may differ and ultimately come
down to the question of one’s point of view.123 The critical reading of surveillance in the context of
social sorting and power distance makes clear that, as Lyon observes, “despite their consequentiality
for life chances and choices, they are seldom subject to ethical inquiry.”124 We are led, therefore, to
develop an ethical response to this. Employees want to be ethically treated and fairly judged in the
workplace. To determine what is ‘ethical’ should be a concern of all stakeholders, and, as Rosenberg
argues, should be “a product of an employer-employee team, responsible for the initial design and
regular updates as well as for evaluating effectiveness and fairness.”125 In the same way, the current
domination of employers, who enjoy a near-Orwellian capacity to spy on employee behaviours and
snoop into their private and work lives, is not tenable.126
120 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 631. 121 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 638. 122 Michael Bassick, Tayler McNamara and Deborah Sullivan, “Employee Surveillance: An Ethical
Consideration,” in The Ethical Imperative in the Context of Evolving Technologies, ed. Michael Bassick, et
al. (Bouler, CO: Ethica Publishing, 2007), 67. 123 Johnathan Yerby, “Legal and Ethical Issues of Employee Monitoring.” Online Journal of Applied
Knowledge Management 1, no. 2 (2013): 51. 124 Lyon, “Facing the future: Seeking ethics for everyday surveillance,” 174. 125 Rosenberg, “The Technological Assault on Ethics in the Modern Workplace,” 150. 126 Rosenberg, “The Technological Assault on Ethics in the Modern Workplace,” 151. Rosenberg illustrates
here that “the use of an employer’s computer should not be equated with the loss of its operator’s rights” and
argues that “a society which values individual freedom cannot function this way.”
An Ethical Rethinking of Workplace Surveillance
244
Privacy is regarded as an employee right in the workplace due to a presumed moral entitlement to be
protected from certain harms and physical, informational, and decisional infringements.127 The rights
and interests of different parties, the employer and the employee, must be balanced so that individual
privacy is protected and balanced with the legitimate needs of the employer, particularly in a situation
that is increasingly dependent on technology.128 Even when one agrees that some kind of regulation
is necessary in the workplace, the extent to which personal privacy may be compromised in pursuit
of a larger end is a matter of much discussion and debate. Job relevance and prior consent are the
ethically relevant factors that most often seem to secure some qualified approval of the use of
surveillance in the workplace. The ethical challenges raided by these factors will be explained later
in this section.
An employee’s privacy is violated whenever personal information is collected, stored, or used by an
employer in any way or for any purpose irrelevant to or in violation of the contractual relationship
between employer and employee.129 George Brenkert and Joseph Desjardins offer arguments to
restrict the types of information employers may gather about employees to information that is ‘job
relevant’. The employer can legitimately acquire information about the prospective employee’s job
qualifications, work experience, educational background, and other information relevant to the hiring
decision.130 Considering this aspect, Brenkert also argues that the “job relevance” requirement limits
the information sought to that which is directly connected to the job description.131 Agreeing with
this argument, Lippke admits that some aspects of a person’s social and moral character, such as
honesty and a willingness to cooperate with others, are job relevant, yet at the same time he rules out
information about an employee’s political or religious beliefs and practices, his or her sexual
preferences, marital status, financial data, etc.132 At this juncture, two things are important, according
to Joseph DesJardins and Ronald Duska: that jobs under surveillance must be jobs that clearly can
cause harm, and that the performance being monitored should be only one that is really and
potentially harmful.133
The notion of ‘informed consent’134 is also relevant to the ethical assessment of workplace privacy.
The relationship between an employee and an employer is generally held to be a consenting
127 Joseph DesJardins and Ronald Duska, “Drug Testing in Employment,” in Ethics in the Workplace, ed.
Robert A. Larmer (Minneapolis: West Publishing Company, 1996), 119. 128 Tom McEwen, Managing Values and Beliefs in Organisations (Essex: Prentice Hall, 2001), 155. Some
parts of this section are taken from my previous research entitled “Privacy in Workplace: An Ethical
Analysis,” submitted to the Faculty of Theology and Religious Studies at KU Leuven in June 2013. 129 Joseph R. DesJardins, “An Employee’s Right to Privacy,” in Contemporary Issues in Business Ethics, eds.
Joseph R. Desjardins and J.J. McCall, (Belmont: Wadsworth, 1985), 225. 130 Joseph R. DesJardins, “Privacy in Employment,” in Moral Rights in the Workplace, ed. Gertrude Ezorsky
(New York: State University of New York Press, 1987), 131. 131 George G. Brenkert, “Privacy, Polygraphs, and Work,” in Contemporary Issues in Business Ethics, eds.
Joseph R. Desjardins and J.J. McCall (Belmont: Wadsworth, 1985), 231. 132 Richard L. Lippke, “Work, Privacy, and Autonomy,” in Ethics in the Workplace, ed. Robert A. Larmer
(Minneapolis: West Publishing Company, 1996), 112. 133 DesJardins, “Drug Testing in Employment,” 123. 134 Informed consent is generally a process of getting permission before conducting an investigation of any
kind on a person, such as health care analysis and researches. In a workplace, an employer is entitled to have
certain specific information about the employee, and employees are permitted to get specific information
about the conditions of their employment, and also about monitoring in the workplace. The general
acceptance of these practices shows the general acceptance of the idea of informed consent in workplace
relations. The consent of employees should be required before new surveillance techniques are introduced in
the workplace. See Steve Clarke, “Informed Consent and Electronic Monitoring in the Workplace,” in
Electronic Monitoring in the Workplace: Controversies and Solutions, ed. John Weckert (Hershey: Idea
Group, 2005), 230-231.
An Ethical Rethinking of Workplace Surveillance
245
relationship.135 The collection and use of personal information about an employee or screening and
monitoring to acquire further details are matters to which an employee must consent in the
workplace. Hence, bypassing consent is prohibited in matters related to personal data and
surveillance in the workplace. According to Steve Clarke, as long as employees are aware of the
nature and extent of electronic monitoring in the workplace, and as long as they consent to these
arrangements, then electronic monitoring is ethically acceptable.136 However, this consent must be
freely given with full knowledge and understanding, because “one is not genuinely consenting unless
he or she can also decide not to consent,” and it is not generally regarded as ethically acceptable to
suppose that “a master-slave relationship [...] was based on consent.”137 Hence, the rightful and
genuine interests of the employee are invariably conditioned by the legitimate interests of the
employer, and vice versa. Therefore, surveillance and other electronic and data monitoring in
workplace, where employee consent is possible, is unacceptable without such consent.
However, researchers like Kirstie S. Ball and Stephen T. Margulis observe in this regard that the
“consent to monitoring is rarely, if ever, freely given in the workplace.”138 This has to be further
researched to determine what internal and external complications it might entail, especially in the
context of employees’ freedoms. The frameworks of ‘job relevance’ and ‘informed consent’ cannot
alone legitimize employee privacy issues, since employees’ expectations are increasingly
compromised by new technologies and the interests of employers. Therefore, to provide enduring
and substantive protection of employee privacy interests, we need to integrate the various ethical
models discussed above in a way that can rectify the shortcomings of each approach taken on its
own. Similarly, the arguments in opposition to electronic surveillance in the workplace are supported
by the finding of this present research in previous chapters, namely that the objectives of surveillance
and its expected benefits are not adequately achieved in the workplace, and thus many limitations
are placed on it. These limitations alter employee behaviours, often with adverse effects.
This research shows that continuous surveillance in the workplace creates and perpetrate
inequality.139 The observation of West and Bowman, that “[s]urveillance hold the very real potential
to violate human rights by harming the quality of worklife, demeaning the individual, treating
employees like property, and reducing them to interchangeable parts in the organizations”140 is
categorically affirmed in this research as well. For this research has also found that ubiquitous
surveillance in the workplace is consistently linked to justice (social) violations, enabling
discriminatory and control practices. Before considering its discriminating tendencies, we shold also
note that modern surveillance raises the issue of disappearing bodies. Employees are no longer seen
as embodied human beings, but “coded” data subjects, amounting to an ontological reductionism
135 Clarke, “Informed Consent and Electronic Monitoring in the Workplace,” 230. 136 Clarke, “Informed Consent and Electronic Monitoring in the Workplace,” 232. There are few other authors
who deal with the prior consent in the workplace. Cf. Carly L. Huth, “The Insider Threat and Employee
Privacy: An Overview of Recent Case Law,” Computer Law & Security Review 29 (2013): 370. 137 Clarke, “Informed Consent and Electronic Monitoring in the Workplace,” 232. 138 Kirstie S. Ball and Stephen T. Margulis, “Electronic Monitoring and Surveillance in Call Centres: A
framework of Investigation,” New Technology, Work, and Employment 26, no. 2 (2011): 115. Cf. David
Zweig and Jane Webster, “Where is the Line between Benign and Invasive? An Examination of Psychological
Barriers to the Acceptance of Awareness Monitoring Systems,” Journal of Organizational Behaviour 23, no.
5 (2002): 605-633. 139 Lyon, Haggerty and Ball, “Introducing Surveillance Studies,” 3. 140 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 639. According to them,
continuous surveillance in the workplace “violates both the “golden rule” (“do unto others as you would have
them do unto you”) and the categorical imperative (“what is good for one is good for all”).”
An Ethical Rethinking of Workplace Surveillance
246
through representation.141 The issue here is twofold: firstly, a different kind of embodiment takes
place in that one’s physicality is symbolized and represented through abstract data and codes, and
secondly, that when the actual or real is represented by something else and lacks immediate presence,
this can be misread or manipulated. In turn, it also becomes an instance of the personification of
information. For the electronic mediation of employees raises the issue of “facelessness”: being
constantly watched from a distance by invisible other causes the identity of employees to be lost in
a field of electronic mediation.
The challenges of employee profiling (reputational vulnerability) and phishing (stealing identities)
can wreak havoc in employees’ lives and diminish their life chances.142 Furthermore, employees are
sorted and discriminatively grouped and categorized according to their supposed risk, danger, and
worth. We can again invoke the “panoptic sort” of Oscar Gandy here. Surveillance functions as
purely a discriminative technology that classifies employees according to who is eligible for special
treatment and who is an object of suspicion.143 The “marginalized” or “dangerous” becomes the prey
of an even more intense unidirectional gaze and object of increased scrutiny for the powerful.144 An
unwanted “male gaze” is also experienced in the workplace, as we have explored in the fourth
chapter, leading to gender-based discrimination in the workplace. In the same way, when women are
the subject of a snooping gaze that turns their body into sexualized object, surveillance fails to
consistently foster a sense of security in the workplace.145 Women employees thus become, as already
noted, the target or victim of Peeping Tom voyeuristic surveillance. These same negative effects are
seen when surveillance is used as a form of ‘disciplinary power,’146 and the less powerful are
dominated by the more powerful and experience total subjugation. The predominance of the
hierarchy established in the workplace through surveillance practices change the rule-based conduct,
favoring the hierarchy and ensuring that constant observation in the workplace becomes a mechanism
of control. The ‘disciplinary or control model’ of Foucault and the notion of a ‘society of control’ by
Deleuze147 indicate this same power control and power distance in the workplace.
The underlying ethical concern here is the tendency to treat the body (employee) as an object to be
watched (problem of voyeurism), assessed and manipulated,148 such that the subjective dimension of
labour is commodified. Employee sorting and power control often have manipulative behavioural
effects on employees. The reduced feeling of employee self-image and impoverished sense of self-
worth can cause employees to act differently in the workplace. Through the creation of a categorical
profile identity at the cost of one’s real self-identity, as we have discussed, employees become
“virtual robots,” behaving only at the will of employers. This starts from the declension of extra-role
behaviours in the workplace. Thus, continuous surveillance in fact curtails the constructive “above-
141 Lyon, “Introduction: Surveillance as Sorting,” 120; Lyon, “Surveillance as Social Sorting: Computer Codes
and Mobile Bodies,” 23; and Lyon, Surveillance Society: Monitoring Everyday Life, 115-116. 142 Jenkins, “Identity, Surveillance and Modernity,” 163-164; Sewell, “Organization, Employees and
Surveillance,” 303-312. 143 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 20-22. 144 Lyon, “Surveillance as Social Sorting: Computer Codes and Mobile Bodies,” 13-30; Ball, “Categorizing
the Workers: Electronic Surveillance and Social Ordering in the Call Center,” 201-225. Cf. Oscar Gandy, The
Panoptic Sort: A Political Economy of Personal Information (Boulder, CO: Westview Press, 1993). One may
ask here, if people are really ‘dangerous,’ should there be no surveillance on them? if not, how to tackle the
danger they pose? The category here mentions is the discriminated group through mere suspicion of doing
wrong. Or in other words, all people are victims of this omnipresent surveillance putting them all in one
category of suspicion. 145 Koskela, “You Shouldn’t Wear that Body: The Problematic of Surveillance and Gender,” 52-54. 146 Foucault, Discipline and Punish: The Birth of the Prison, 200-203. 147 Foucault, Discipline and Punish: The Birth of the Prison, 170-203; Deleuze, “Postscript on the Societies of
Control.” 3-7. 148 Staples, The Culture of Surveillance: Discipline and Social Control in the United States, ix.
An Ethical Rethinking of Workplace Surveillance
247
and-beyond” behaviours of employees.149 A digital colonizing experience, or digital domination,
grounds employees’ continuous disengagement from work and can lead to job abandonment.150 The
default role obligation demanded through external power control leads employees to engage in
reciprocal forms of deviance, such as production deviance and opportunistic actions,151 and finally
increases absenteeism, presenteeism and employee turnover.
There is also significant evidence, as described towards the end of the fourth chapter, that ubiquitous
surveillance and the subsequent stress-related issues lead to occupational violence (e.g., stealing and
damaging work-related properties) as well as antisocial behaviours152 towards friends, family and
other social groups. Thus, to summarize, the rule-oriented analysis and the social effects (justice)
perspective show that surveillance, though implemented in accordance with pertinent laws and
precepts, can harm individual employees, organizations and the wider society. Therefore, consistent
and ubiquitous workplace surveillance is generally regarded as unethical from a rule-based ethical
perspective.
Thirdly, the virtue-based perspective, or virtue ethics, disregarding the result or rules, looks for what
kind of person one is153 and thus whether decisions or actions in the workplace improves one’s
character and that of the organization or the larger community. Virtue ethics seeks to assess the whole
person rather than just certain traits or the details of a particular action.154 It gives predominant
consideration and respect to the moral agency of a person, and thus perceives “integrity” as a pre-
eminent virtue that synthesizes other key virtues, such as honesty, moderation, justice, and
prudence.155 With a high regard for personal integrity, some researchers like Rick Iedema and Carl
Rhodes have begun to form arguments in support of surveillance, holding that monitoring makes
employees better disciplined and more work-oriented.156 According to Iedema and Rhodes, “[t]his
ethics resides in an ‘undecided space’ – one where individual conduct and subjectivity are not
decided by surveillance-based discipline but performed by active subjects in interaction with each
other in relation to that discipline.”157 The term ‘undecided’ is used to consider the capacity of the
individual, with his or her own power or knowledge, to be reflexive and active in deciding what is
good for them, for organizations and for the wider society.158 However, as West and Bowman argue,
149 Petitta and Vecchione, “Job Burnout, Absenteeism, and Extra Role Behaviours,” 98. 150 D’Cruz, Workplace Bullying in India, 9-14; Johns, “Presenteeism in the Workplace: A Review and Research
Agenda,” 521-527; and Demirbag et al., “Employee Service Abandonment in Offshore Operations,” 178. 151 Zweig, “Beyond Privacy and Fairness Concerns,” 112; Robinson and Bennett, “A Typology of Deviant
Workplace Behaviours,” 555-572; and Bhave, “The Invisible Eye? Electronic Performance Monitoring and
Employee Job Performance,” 611-613. 152 Singh, Organizational Behaviour: Text and Cases, 182; Paludi, Nydegger and C. A. Paludi, Understanding
Workplace Violence, 14-15; D’Cruz, Workplace Bullying in India, 10-13; and Sinha, Culture and
Organizational Behaviour, 28-52. 153 The theory of virtue ethics reflects and deliberates that “an act to be good on the basis of the character trait
or virtue that the act evidences.” Dean Gueras and Charles Varofalo, Practical Ethics in Public
Administration, 3rd ed. (Vienna, VA: Management Concepts, 2010), 59. 154 Gueras and Varofalo, Practical Ethics in Public Administration, 59. 155 West and James S. Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 640. 156 Rick Iedema and Carl Rhodes, “The Undecided Space of Ethics in Organizational Surveillance,”
Organization Studies 31, no. 2 (2010): 199-217; West and Bowman, “Electronic Surveillance at Work: An
Ethical Analysis,” 640. 157 Iedema and Rhodes, “The Undecided Space of Ethics in Organizational Surveillance,” 199. Iedema and
Rhodes quotes Mark Bevir’s idea in this regard that “[b]ecause different people adopt different beliefs and
perform different actions against the background of the same social structure, there must be an undecided
space in front of these structures where individual subjects decide what beliefs to hold and what actions to
perform for reasons of their own.” Iedema and Rhodes, “The Undecided Space of Ethics in Organizational
Surveillance,” 201. Cf. Mark Bevir, “Foucault, Power and Institutions,” Political Studies XLVII (1999): 358. 158 Iedema and Rhodes, “The Undecided Space of Ethics in Organizational Surveillance,” 201.
An Ethical Rethinking of Workplace Surveillance
248
“deploying a surveillance system covertly indicates that the employer believes that employees lack
integrity to perform their duties; such an approach does not contribute to human flourishing in the
workplace.”159 This type of engagement, we argue in this research contrary to Iedema and Rhodes,
has the problem that the conscious practice of the ethical conduct by employees is constrained by the
power distance and power control exercised through managerial surveillance.
In the same way, West and Bowman, referring to Elin Palm, observe that employees, when subjected
to ubiquitous surveillance (continuous observation and persistent control), fail to act in accordance
with their own true selves, and often sacrifice their personal integrity.160 This even causes them to
engage in a situation with “adaptive behaviours” through a “manufactured” self, and this anticipatory
conformity to other’s will leads to self-subordination.161 This tendency, according to Palm, “reduces
the ability of self-control at work,” such that “employees are no longer said to govern themselves.”162
In this context we can also appeal to the Foucauldian understanding of the self,163 as constructed
within the bounds of power relations. However, Sewell and Barker observe that if the self is a
complex construction, “then we need an approach to the ethics of surveillance that incorporates an
appreciation of the role it plays in that construction.”164 So, we find that a manipulated self is acting
in the workplace under the influence of external control and power differences.
The empirical (qualitative) study we conducted in the Indian organizational workplace, described in
the previous chapter of this research, shows that a lack of privacy and freedom and prevalence of
power distance and control constrain the employee’s self-disclosure as a human self. This means that
electronic monitoring systems challenge and threaten the “human” aspect of employees as well as
their work-quality and work-ethics. This study also reminds us of the ontological insecurity165 one
may feel in the workplace, which tends to be overlooked by surveillance advocates. A workable
surrender to authority is fostered here, resulting in powerlessness and a sense of vulnerability.
Through this compulsive irrational submission to authority, as Erich Fromm described, one loses
one’s “self” and becomes an automaton.166 Finally, as West and Bowman would agree, through
surveillance systems and processes in the workplace, “[e]mployee behaviour becomes rationalized
and individuals are objectified, manipulated and devalued, denying them not only voice but also the
159 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 640. 160 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 640; Elin Palm, “Securing
Privacy at Work: The Importance of Contextualized Consent,” Ethics of Information Technology 11, no. 4
(2009): 233-241. 161 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 640; William S. Brown,
“Ontological Security, Existential Anxiety, and Workplace Privacy,” Journal of Business Ethics 23, no. 1
(2000): 61-65; and Palm, “Securing Privacy at Work: The Importance of Contextualized Consent,” 235. 162 Palm, “Securing Privacy at Work: The Importance of Contextualized Consent,” 235. 163 Sewell and Barker, “Neither Good, nor Bad, but Dangerous,” 191. Cf., Michel Foucault, “Space,
Knowledge, and Power,” in The Foucault Reader, ed. Paul Rabinow (Harmondsworth: Penguin Books,
1984a); Michel Foucault, “On the Genealogy of Ethics: An Overview of Work in Process,” The Foucault
Reader, ed. Paul Rabinow (London: Penguin Books (original: Harmondsworth: Penguin Books, 1984b),
1991(350-355. 164 Sewell and Barker, “Neither Good, nor Bad, but Dangerous,” 191. To take an ethical position, this
constructed self, according to Foucault, should follow four considerations: (1) ethical substance – related to
human aspects of moral conduct, (2) subjectification – human inclination to follow the moral obligation, (3)
practical ascetisim – ways of human action to become ethical subjects, and (4) moral telos – the type of being
an individual aspiring to be. Foucault, “On the Genealogy of Ethics: An Overview of Work in Process,” 352-
355; Sewell and Barker, “Neither Good, nor Bad, but Dangerous,” 190. 165 William S. Brown has already reflected in this same direction. Cf. Brown, “Ontological Security, Existential
Anxiety, and Workplace Privacy,” 61-65. 166 Fromm, Escape from Freedom, 269.
An Ethical Rethinking of Workplace Surveillance
249
necessity to regard them as moral agents.”167 This ends the creation of an inauthentic self and leads
to employee alienation and attrition.
Finally, the individual assessment of rule-based, results-based and virtue-based approaches and their
convergence show that being a virtuous person respecting rules and examining results can undermine
the need for surveillance. The continuous negative effects of workplace surveillance often outweigh
the intended benefits and affirm, from an employee perspective, that it is unethical for management
to continuously monitor them. In relation to workplace surveillance, though there are situations
where neither the organization nor the employees can possess absolute rights, it becomes
counterproductive: “[t]he right to manage can be a seductive rationale for finding the greatest good,
exceeding what is reasonable and necessary at the expense of important rights.”168 It becomes
unethical, since “monitoring goes beyond what is sensible, demands precise information about
employer behaviour, fails to promote the social good, and when it compromises work practices.”169
Similarly, a conflict occurs when the benefit and goodwill of the employer alone is given priority,
forgetting the rights and interests of employees. The problem here is not merely a need to balance
surveillance, privacy and impartiality, but rather “[t]o the extent that we risk the loss of privacy we
risk, in a very real sense, the loss of our very status as subjective, autonomous persons.”170 Therefore,
revealing the current status of the employee perception, workplace surveillance is shown to bring
with it many uncertainties, and thus should be used only with serious reservations.
6.2.2 Ethics of Rights, Power and Social Justice
The rights approach shows that employees have a right to be treated with respect and dignity. This
upholds employees’ rights to choose freely and to have these choices respected. As illustrated in this
research, David Meeler states that “[e]ach person has a fundamental right to be respected and treated
as a free and equal rational person capable of making his or her own decisions. This implies other
rights (e.g., privacy, free consent, freedom of conscience, etc.) that must be protected if a person is
to have the freedom to direct his or her own life.”171 Practices in the workplace can run against this
dignified understanding of the individual when an employee is forced to work without a ‘personal
space’ – a violation of his or her individual and social rights. The rights approach to the ethics of
workplace surveillance proposed by Patricia Werhane, which we have already discussed, is grounded
on the moral rights of employees and a premise that “human beings have moral claims to a set of
basic rights vis-à-vis their being human.”172 What Werhane speaks as the rights talk - human rights
or moral rights - is derived from the assumption that human beings have intrinsic value and thus that
every person is entitled to these rights regardless of socio-cultural, economic or political differences.
167 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 641. 168 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 643. 169 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 645. 170 Michael P. Lynch, “Privacy and the Threat to the Self,” The New York Times, June 22, 2013.
https://opinionator.blogs.nytimes.com/2013/06/22/privacy-and-the-threat-to-the-self/ [accessed on
November 15, 2017]. Cf. West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 646. 171 David Meeler, “Five Basic Approaches to Ethical Decision-Making,” Handout for Central Approaches to
Ethics, http://faculty.winthrop.edu/meelerd/docs/rolos/5_Ethical_Approaches.pdf [accessed November 25,
2017]. See also, for instance, Manuel Velasquez, Claire Andre, Thomas Shanks, S.J., and Michael J. Meyer,
“Thinking Ethically,” Markkula Center for Applied Ethics, August 1, 2015,
https://www.scu.edu/ethics/ethics-resources/ethical-decision-making/thinking-ethically/ [accessed
November 25, 2017]. 172 Tara J. Radin and Patricia H. Werhane, “Employment-at-Will, Employee Rights, and Future directions for
Employment,” Business Ethics quarterly 13, no. 2 (2003): 114.
An Ethical Rethinking of Workplace Surveillance
250
Werhane argues convincingly that freedom and liberty are basic moral rights of all persons, and that
these rights, along with reason as an underlying principle, enable an individual to exercise freedom
of choice and thus to develop full human capabilities.173 In her opinion, freedom fosters and protects
the individual desire “to be his own master,” “to be self-directed” and “to act and decide rather than
be acted upon and decided for by others.”174 We have already noted that this freedom is drastically
constrained in the workplace when employees act, not of their own accord, but in line with the desires
of the actual or virtual observer. One result of ubiquitous surveillance in the workplace is forced
involuntary behaviour. Werhane argues in this regard that “if employers and managers have certain
rights, say, to respect, free speech, and choice, employees should also have equal claims to those
rights.”175 It also demotes the human ethic system of work to “a mechanistic form of control which
devalues individual work habits and creative skills, treats people like property, and reduces workers
to interchangeable parts of the organization rather than individual members.”176 The lack of
constitutionally guaranteed individual rights and the contractual agreements in organizations, often
favouring the organization itself, leads to employee suffering in the workplace.
In the same way, Tara J. Radin and Patricia H. Werhane quote Christopher McMahon, a defender of
employee rights, who writes that “although, as property owners or agents for companies, employers
and managers have rights to hire and fire “at will,” this does not provide them with moral justification
for ignoring other employee rights claims, including, for example, rights to participate in corporate
decision-making.”177 Overall dissatisfaction about the lack of privacy rights in the workplace is
widely explored in literature on organizational surveillance. For as Botan and Vorvoreanu observe,
surveillance infringes on employees’ right to private identity and their autonomy.178 This in fact refers
to the panoptic effect, discussed above, which compromises the intended benefits of surveillance.
Persistent and continuous electronic surveillance in the organizational workplace reminds us today
that the Foucauldian electronic panopticon effects are once again present, as employees are forced to
internalise the discipline and control demanded by their employer.179 In this context of the permanent
snooping on employees, Sewell and Wilkinson exclaim that “the solitary confinement of Taylorism
has been superseded by the electronic tagging of the Information Panopticon.”180 This imposition of
permanent control poses further psycho-physical threats. We have also seen that the pressure of being
constantly under someone’s monitoring gaze in the workplace leads ultimately to stress, health
hazards, and distrust, and eventually to a break in the employer-employee relationship.
Power becomes a factor in the picture of unethical workplace surveillance due to the “coercive”
nature of such practices, as we have discussed in the first chapter, by which surveillance becomes a
means of control and manipulation. Graham Sewell et al. share the same concern, writing that the
173 Patricia H. Werhane, Tara J. Radin and Norman E. Bowie, Employment and Employee Rights (Malden,
MA: Blackwell Publishing, 2004), 9. 174 Werhane, Radin and Bowie, Employment and Employee Rights, 12. 175 Radin and Werhane, “Employment-at-Will, Employee Rights, and Future directions for Employment,” 114.
Originally in: Patricia Werhane, Persons, Rights, and Corporations (Englewood Cliffs, N.J.: Prentice- Hall,
1985). 176 Alder, “Ethical Issues in Electronic Performance Monitoring,” 736. 177 Radin and Werhane, “Employment-at-Will, Employee Rights, and Future directions for Employment,” 114.
Cf. Christopher McMahon, Authority and Democracy (Princeton: Princeton University Press, 1995). 178 Botan and Vorvoreanu, “What do Employees Think about Electronic Surveillance at work?” 130. 179 Bain and Taylor, “Entrapped by the ‘Electronic Panopticon’? Worker Resistance in the Call Centre,” 4. 180 Graham Sewell and Barry Wilkinson, “Empowerment or Emasculation? Shopfloor Surveillance in a Total
Quality Organization,” in Reassessing Human Resource Management, eds. Paul Blyton Peter Runbull
(London: Sage, 1992a), 109. Cf. Graham Sewell and Barry Wilkinson, “Human Resource Management in
“Surveillance” Companies,” in Human Resource Management and Technical Change, ed. Jon Clark, 137-
154 (London: Sage, 1993); Graham Sewell and Barry Wilkinson, “Someone to watch over me: Surveillance,
Discipline and the Just-in-Time Labour Process,” Sociology 26 (1992b): 271-289.
An Ethical Rethinking of Workplace Surveillance
251
workplace surveillance has the effect of “intensifying work, reducing autonomy, increasing stress,
and undermining solidarity by pitting worker against worker.”181 According to them, the argument
of surveillance as a “discourse of care” is valid and legitimate if and only if it happens in a “case of
the few watching the many in the interest of the many.”182 Yet that is not the situation here, because
we face a “case of the few watching many in the interests of the few,” as expressing the “discourse
of coercion.”183 The rights and interests of the many – employees – are often neglected. Sewell et al.
also perceive the main purpose of surveillance as being “not to protect against antisocial behaviour
(although this may be a side effect), but to ensure that employees work as hard as they possibly can
all the time.”184 Our empirical study supports this claim. This research also aligns with the study of
Ball on the effect of demotivation in the workplace. People behave differently when they know they
are under surveillance in an effort to exploit the system to get on the good side of management.185 In
the context of surveillance and power-plays in organizations, the research of Joris Lammers et al.
also makes a significant contribution to our understanding of the hypocrisy that comes along with
the increase of power.186 Based on anecdotal evidence, they suggest that “the power [of managers]
undermines people’s sense of morality, corrupting their thoughts and behaviour.”187 This shows that,
when authorities feels more powerful and dominant, there is a motivation to assess and judge
employees more harshly and even to behave immorally, which may in turn cause them to engage in
more invasive monitoring practices.
In this regard, the moral value of personal autonomy and subsequent extension of employee rights to
include psychological autonomy, is also infringed by electronic surveillance. For instance, Emma
Rooksby and Natasha Cica rightly claim that “electronic surveillance is morally wrong where it is
used by employers or managers to facilitate coercive or manipulative changes to workers’ values
insofar as this involves an attempt to undermine or distort their personal autonomy.”188 Thus, the
infringement of an individual employee’s rights of personal autonomy, privacy, etc. threated personal
autonomy and employees’ personal and social values. Rooksby and Cisa argue that electronic
surveillance and its wide-ranging implementation in a workplace distort employees’ attitudes – both
motivational and informational - as well as their executive qualities, as they merely enact the will of
their employer.189 Correspondingly, the manipulation of motivational, informational, and executive
qualities are just three forms of covert non-constraining control of others, whereby “continuous
surveillance of all aspects of workers’ behaviours creates an environment in which they may find it
difficult to resist compliance with guidelines for workplace behaviour set down by employers and
managers, even where those guidelines are not coercively enforced.”190 Motivational manipulation
is involved when an employee is forced to change his or her values unreflectingly to suit the corporate
values and culture, while unreflective adoption of workplace-preferred values leads to the
181 Graham Sewell, James R. Barker and Daniel Nyberg, “Working Under Intensive Surveillance: When Does
‘Measuring Everything that Moves’ Become Intolerable?” Human Relations 65, no. 2 (2012): 191. 182 Sewell et al., “Working Under Intensive Surveillance,” 191. 183 Sewell et al., “Working Under Intensive Surveillance,” 191. 184 Sewell et al., “Working Under Intensive Surveillance,” 191. 185 Ball and Margulis. “Electronic Monitoring and Surveillance in Call Centres,” 113-126. Allen et al. also
speak about this type of odd behaviours in response to being monitored by referring to it as the “chilling
effect” in the workplace behaviours. Allen et al., “Workplace Surveillance and Managing Privacy
Boundaries,” 172-200. 186 Joris Lammers, Diederik A. Stapel and Adam D. Galinsky, “Power Increases Hypocrisy: Moralizing in
Reasoning, Immorality in Behaviour,” Psychological Science 21, no. 5 (2010): 737-744. 187 Lammers et al., “Power Increases Hypocrisy: Moralizing in Reasoning, Immorality in Behaviour,” 737. 188 Emma Rooksby and Natasha Cica, “Personal Autonomy and Electronic Surveillance in the Workplace,” in
Electronic Monitoring in the Workplace: Controversies and Solutions, ed. John Weckert, 242-259 (Hershey:
Idea Group Publishing, 2005), 243. 189 Rooksby and Cica, “Personal Autonomy and Electronic Surveillance in the Workplace,” 249. 190 Rooksby and Cica, “Personal Autonomy and Electronic Surveillance in the Workplace,” 250.
An Ethical Rethinking of Workplace Surveillance
252
manipulation of executive qualities and distortion of information, and the fact that certain
information is regarded as suspicious can lead to informational manipulation.191
Likewise, even referring to the legitimate interests of the organization to implement surveillance
technologies, the use of such technologies cannot be justified prima facie, given that personal, often
vested and manipulative, interests drive this use without a clear and direct demonstration of
organizational advantage. The notion of a worker’s right to autonomy is significant here, as it ensures
employees’ control over their own work situation by providing substantial freedom in carrying out
their work in the way they think best.192 Also at issue here is “personal autonomy” and “worker
autonomy.” Worker autonomy is valuable as it enables employees to act upon their own values in
workplace situations, while personal autonomy covers a broader ground, taking care of the ways in
which employees adopt and act upon these values,193 even beyond the terrain of the workplace. The
moral significance of personal autonomy in connection with employee self-responsible regulative
behaviours will be discussed in the later part of this chapter.
Werhane also speaks about equal consideration or a right to be treated as equal to another holder of
a moral right.194 This takes the rights of social justice into consideration along with individual rights.
It shows the necessity of a social justice approach, as surveillance in the workplace affects
employees’ social behaviour as well, as we have seen. It is argued, in this regard, that “employees
quite often make sense of (i.e. create significant meaning around) their work by drawing on ideas
that stem from their immediate task environment and from broader institutional environments
relating to social systems within and around the organisation itself.”195 The system of economic
efficiency may be an example of this kind, both as the social system and as the surveillance indicator.
This brings us to a related question: is surveillance so efficient as it claims to be, or does it seek
another kind of efficiency, really an economic efficiency? Is it more a problem about power (a social
problem) or an economic problem? For if it is only economic, then it is easy to manage that: merely
conduct some studies to see what level of control people will tolerate, then deduce well. If people do
still adopt these all-embracing control systems, even knowing it is not effective, we can conclude
that they do it because of power, to borrow the Foucauldian thinking. People, when vested with
power and in power positions, become like the Grand Inquisitor of Dostoyevsky,196 fixated on having
their eye on others.
Surveillance in the workplace, therefore, is only one part of a global cultural trend evident in the
modern society, state, and economy: people who are different are not tolerated. Everybody must act
in certain way, and by controlling you can exclude the more “crazy” people. Foucault also writes
about this in his History of Madness, focusing on a pattern of keeping disturbing elements out of the
system. This is connected to the model of “mainstreaming” in management, where one is forced to
think like the one who is above them in the hierarchy of system, or where someone is dominating
191 Rooksby and Cica, “Personal Autonomy and Electronic Surveillance in the Workplace,” 250-251. 192 Rooksby and Cica, “Personal Autonomy and Electronic Surveillance in the Workplace,” 252-253. Cf. Philip
Brey, “Worker Autonomy and the Drama of Digital Networks in Organizations,” Journal of Business Ethics
22, no. 1 (1999): 16; Robert C. Solomon, Above the Bottom Line: An Introduction to Business Ethics, 2nd ed.
(Fort Worth: Harcourt Brace College Publishers, 1994), 392. 193 Rooksby and Cica, “Personal Autonomy and Electronic Surveillance in the Workplace,” 253. 194 Werhane, Radin and Bowie, Employment and Employee Rights, 9-10. 195 Kirstie S. Ball and Stephen T. Margulis, “Electronic Monitoring and Surveillance in Call Centres: A
Framework for Investigation,” New Technology, Work and Employment 26, no. 2 (2011): 114. 196 The Grand Inquisitor (1880) is a poem in the novel The Brothers Karamazov by Fyodor Dostoevsky. It is
important because of its ideas about human nature and freedom. Cf., Fyodor M. Dostoevsky, “The Grand
Inquisitor,” in The Brothers Karamazov, trans. Constance Garnett,
https://www.mtholyoke.edu/acad/intrel/pol116/grand.htm [accessed February 15, 2017].
An Ethical Rethinking of Workplace Surveillance
253
another. Diane van den Broek here identifies the management-imposed normative and cultural
controls and mechanisms that impact employees and negatively influence their behaviours.197
Surveillance and its subsequent individual and social intrusions create to and exacerbate personal
and social injustices. Justice violations in the workplace happen, within the context of surveillance,
when certain individuals or group of people are subject to unequal treatment or discrimination. We
have already discussed how surveillance leads to the sorting of employees according to their gender,
ethnicity, religion, sexual orientation, and even class/caste structures in certain contexts like India.
We may conclude that the new discriminative patterns and inequalities and unequal behavioural
tendencies in the workplace greatly increase power control and power distance, as well as social
sorting and discrimination. Individual and collective resistance to workplace surveillance on the part
of employees, by way of manipulated appraisal behaviours, presenteeism, absenteeism, and altered
organizational functioning, all indicate that employees resent this managerial activity. From an
individual rights perspective, the intrinsic value of the human body and human nature itself is
threatened as employees’ bodies increasingly are made the subject of unwanted and ubiquitous
scrutiny with various adverse effects, such as intrusions of bodily and cognitive or informational
privacy, a lack of personal space and objects, and constraints on self-directed individual and social
conduct. The limitation of privacy does not ensure good performance, but rather leads to inadequate
fulfilment of each one’s roles responsibilities.198 Employee surveillance is not necessary to ensure
the increased productivity and the subsequent improved quality and quantity of work output.
Searching for evidence that an employee is engaged in fraud or theft is not the same as a routine
searches, continuous e-mail and telephone monitoring, or extensive CCTV surveillance of all
employees, which treat them all as though they are under suspicion.199 Accordingly, from a social
justice perspective and thus considering equality,200 serious limitations are imposed on employees.
A ‘Big Brother’ management style that seeks to exercise total control over employees renders them
powerless.
All of these claims validate the argument presented above, that from an employee perspective
ubiquitous surveillance is unethical in the organizational workplace. In this context, Phil Taylor and
Peter Bain rightly observe, referring to Paul Thompson and Chris Warhurst (1998), that a
contemporary management styles reliant on surveillance and employee monitoring “has produced its
own dystopian off-spring, whose accounts emphasise ‘captured subjectivity and labour trapped in
totalising institutions combined with new, oppressive forms of regulation and surveillance […].”201
We must determine, then, what relative value should be assigned to the conflicting rights and interests
of employers and employees, and what managerial rationality or values can be applied to it in the
employee surveillance context. In what follows, we explore this through a detailed analysis of body
197 Diane van den Broek, “We have the Values: Customers, Control and Corporate Ideology in Call Centre
Operations,” New Technology, Work and Employment 19, no. 1 (2004): 2-13. Donald J. Winiecki, adapting
Foucauldian genealogical perspective in analysing technology-mediated labour in call centres, also makes the
same observation in his study. Cf. Donald J. Winiecki, “Shadowboxing with Data: Production of the Subject
in Contemporary Call Centre Organizations,” New Technology, Work and Employment 19, no. 2 (2004): 78-
95. 198 Philip Brey, “The Importance of Workplace Privacy,” in The Ethics of Workplace Privacy, eds. Sven Ove
Hansson and Elin Palm (Brussels: P.I.E.-Peter Lang, 2005), 114. 199 Brey, “The Importance of Workplace Privacy,” 115. 200 Within the limitedness and scope of this research, I have mentioned only about the formal equality notion,
equality before law. 201 Phil Taylor and Peter Bain, “An Assembly Line in the Head: Work and Employee Relations in the Call
Centre,” Industrial Relations Journal 30, no. 2 (2003): 103. Cf. Paul Thompson and Chris Warhurst, eds.,
Workplaces of the Future (London: Macmillan, 1998), 6.
An Ethical Rethinking of Workplace Surveillance
254
ontology and how a practice of ubiquitous surveillance can harm the relationship between employees
and employers.
6.2.3 The Irreducibility of the Person and the Ethics of Big Data and the Body-Subject
Lukas D. Introna, using a Levinasian notion of ethics, argues that workplace surveillance is unethical
and unfair.202 Introna refers here to “the multiplicity of formal and informal practices of monitoring
and recording aspects of an individual or groups’ behaviour ‘at work’ for the purposes of judging
these as appropriate or inappropriate; as productive or unproductive; as desirable or undesirable; and
so forth.”203 He speaks first from the perspective of the Levinasian concept of the “irreducibility of
the other,” and holds that “[s]urveillance in its operation renders the Other faceless and
speechless.”204 For ethics happens when the other is encountered as Other and the ‘face’ solicits one
through its expression, bringing about an encounter with the other in everyday life.205 Surveillance
reduces the face in the workplace, according to Introna, by the operation of power ‘at distance’ that
functions as the logic behind surveillance, which [power] is expressed physically and institutionally
in the workplace.206 The same is argued sociologically by David Lyon, as we have already discussed
in previous chapters, surveillance is now about ‘remote-world’ and ‘remote-relations,’ where co-
present embodied persons no longer see the faces of those with whom they engage. For Lyon, the
“enlightenment attitudes, embedded in modernity [here that of the relation between abstracted data
and embodied social persons], have fostered facelessness, and electronic mediation has exacerbated
this situation today.”207 Reflection on this missing face lead both Introna and Lyon to regard
surveillance as unethical and unfair.
Secondly, surveillance in its operation, Introna opines, is not just a general practice, but comes with
a purpose-making judgement over the monitored – one that “starts with a category and ends with a
judgement relative to that category”208 (productive, suspicious, etc.). The subsequent encounter,
Introna continues, re-produces and legitimises this judgement and the “otherness of the other, the
exceptional, is neatly bracketed and ‘covered over’ […].” The problem here is that “the ethical
paradox of rendering the Other present through the monitoring data is that the possibility for speaking
– encountering the Other – is exactly circumvented by the argument that it is ‘fair and just’ that all
are rendered equal by the objectivity of the data and treated only in terms of that. In this way the
voice of the Other becomes silenced in the supposedly ‘just’ economy of the category and the rule.”209
Acting and behaving merely according to the facts presented, therefore, again leads to unjust and
unfair decision-making in the workplace. For, referring to the Levinasian notion of the Other, Introna
sharply exemplifies that “the ethical demand that we encounter the other as a face, to let the other
explain him or herself, to let him or her speak, to allow them to question the validity of our judgement,
202 Lukas D. Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” Surveillance and Society 1, no. 2
(2003): 210-216. 203 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” 210. 204 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” 212. To denote the Other, Introna also uses
the capital ‘O’ as it is in Levinas, who uses autrui (other with capital ‘O’) as opposed to autre (other) to signal
the former (Other) as proper noun. The other for Levinas is an absolute and irreducible singular that goes
“beyond all categories of good and evil, as well as beyond the force of reason, even reasonable reason. Introna,
“Workplace Surveillance ‘is’ Unethical and Unfair,” 210. Cf. Emmanuel Levinas, Outside the Subject, trans.,
M.B. Smith (London: The Athlone Press, 1993), 35. 205 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” 211-212. 206 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” 212. 207 Lyon, “Surveillance as Social Sorting,” 27. 208 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” 212. 209 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” 213.
An Ethical Rethinking of Workplace Surveillance
255
again, and again […]”210 External monitoring though electronic machines and systems clearly lacks
this kind of ethical responsibility.
Thirdly, Introna speaks about the radical asymmetry of every ethical relation, which leads to the
question of justice – the equality of all before the law.211 For, in justice, laws and regulations are
developed to ensure equality of all people without distinction between “those close and those far
off,”212 and especially those who are silenced due to socio-economic and cultural factors. In the
workplace, as previously explored, employees are placed in a vulnerable situation by electronic
surveillance that presumes a judgement of worth and suspicion. This judgement, Introna observes, is
suggested by the data disregarding individual circumstances and devoid of any legitimacy,213 and
thus ethics and justice, in Levinas’s sense, are rendered unfeasible and even impossible. This means
that on the one hand one is urged to take an extra mile, suspending judgements through monitored
data alone, in order to fully understand the circumstances, while on the other hand it warns that
workplace surveillance is not a ‘solvable’ ethical problem,214 as there is no ideal balance between the
conflicting interests. However, Introna opines, “the working out of ethics and justice in everyday
workplace surveillance practices starts by accepting that they are unethical and unfair, from the start,
as such.”215 This situation opens a new ethical space and platform for encountering the problem,
leading to further questions and reflections.
What is original and essentially human is that which makes a human being completely unique in the
world and cannot be reduced to mere accidental phenomena and data. With this in mind, one can say
that employees have an irreducible character by virtue of being human, and that this irreducible and
unrepeatable character is supplemented with the notion of the other. When applied to surveillance
ethics, when there are principles in management ethics to which human action should adhere in cases
when an action has another person at its object, one should not treat him or her as a means to an end
or as a tool, but rather as having his or her own purpose.216 The completeness of the human being is
disregarded when this concern is not adequately taken into account, by which the human person is
degraded and humiliated from his or her wholeness. This irreducibility of the human being becomes
the moral basis, on the one hand, for our individual and shared humanity, and on the other hand, for
universal human rights. It is manifested in the workplace when due respect for self and other is
demonstrated through maintenance of organizational conventions by all members concerned. The
contrary, however, is reflected in the workplace when employees are reduced to mere data codes and
body-subjects. Therefore, it is necessary that we analyse here the ethics of big data and the body-
subject.
We may define “data” as any facts and statistics collected for later reference. Data is “a
reinterpretable representation of information in a formalized manner suitable for communication,
interpretation, or processing [which] can be processed by human or by automatic means.”217
210 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” 213. 211 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” 213. It is due to the Levinasian understanding
of justice that “there is no distinction between those close and those far off.” 212 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” 213-214. Originally in: Emmanuel Levinas,
Otherwise than Being or Beyond Essence, trans. A. Lingis (Dordrecht: Kluwer Academic Publishers, 1991
[1974]), 159. 213 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” 214. 214 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” 214. 215 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair,” 215. 216 Wojciech W. Gasparski, “Beyond the Prose of Business,” in Spirituality and Ethics in Management, ed.
Zsolnai, László, 123-140 (New York: Kluwer Academic Publishers, 2005), 129. 217 Richard Kemp, “Big Data and Data Protection,” Kemp IT Law (2014): 2. Cf.
http://www.kempitlaw.com/wp-content/uploads/2014/10/Big-Data-and-Data-Protection-White-Paper-v1_0-
An Ethical Rethinking of Workplace Surveillance
256
According to Richard Kemp, “[t]he term ‘Big Data’ refers to large amounts of different types of data
produced with high velocity from a high number of various types of sources.”218 It is the exponential
availability, use and rapid growth of information that marks data in our post-modern data-driven
world. One of the challenges Big Data faces is the focus given to the volume and consequent inability
to control the flow and the qualification aspects. This leads to the need for a new approach to data
management that considers all dimensions of information. Nawsher Khan et al. identify three main
characteristics of Big Data: “(a) the data are numerous, (b) the data cannot be categorized into regular
relational databases, and (c) data are generated, captured, and processed very quickly.”219 Elena
Geanina Ularu et al. illustrate, in this regard, that “[l]ives today are impacted by the ability of the
companies to dispose, interrogate and manage data. The development of technology infrastructure is
adapted to help generate data, so that all the offered services can be improved as they are used.”220
So, Big Data today is said to have a promising range of applications for business organizations.
However, the improper use of the data and its possible manipulation is a major challenge that Big
Data brings into our discussion. As it consists of a large amount of complex data, security and privacy
become an important challenge for Big Data.221 The analysis of Big Data is important in this research,
as in the organizational workplace with its digital and computing scenarios, information is today
generated, collected, stored, retrieved, and used at a rate that rapidly exceeds all expectations.222 The
biggest ethical challenges this creates concerns the user’s and holder’s privacy and its sorting
character. We have already discussed in the third and fourth chapters respectively. This arises due to
the possible manipulation of so-called personal information (secretive facts and sensitive data) that
are not supposed to be revealed. For instance, the use of Big Data according to Ghani et al., enables
those who handle the data “to identify patterns and trends which may predicts people’s dispositions,
for example, related to health, political viewpoints or sexual orientation.”223 In the context of
workplace, this may cause employees to be unfairly and discriminately treated. So, when this data is
related to an identifiable living individual, its collection and usage are to follow data protection acts.
We have already explored several data protection acts in the first chapter, as well as data security
and the issue of privacy in the third chapter of this research.
November-2014.pdf [accessed November 22, 2017]. According to Elena Geanina Ularu et al. “[t]he explosion
of data cannot be any more measured in gigabytes, isnce data is bigger there are used etabytes, exabytes,
zettabytes and yottabytes.” Elena Geanina Ularu et al., “Perspective on Big Data and Big Data Analytics,”
Database Systems Journal 3, no. 4 (2012): 5-6. 218 For Kemp, big datasets are “large, diverse, complex, longitudinal, and/or distributed datasets generated from
instruments, sensors, Internet transactions, email, video, click streams, and/or all other digital sources
available today and in the future.” Kemp, “Big Data and Data Protection,” 2. More details on big data are
available in: Norihan Abdul Ghani, Suraya Hamid, and Nur Izura Udzir, “Big Data and Data Protection:
Issues with Purpose Limitation Principle,” International Journal of Advances in Soft Computing & Its
Applications 8, no. 3 (2016): 116-121; Doug Laney, “3D Data Management: Controlling Data Volume,
Velocity, and Variety,” Application Delivery Strategies: Meta Delta (6 February 2001): 1-3; Nawsher Khan
et al., “Big Data: Survey, Technologies, Opportunities, and Challenges,” The Scientific World Journal (2014):
1-18; and Elena Geanina Ularu et al., “Perspective on Big Data and Big Data Analytics,” Database Systems
Journal 3, no. 4 (2012): 3-14. 219 Khan et al., “Big Data: Survey, Technologies, Opportunities, and Challenges,” 1. 220 Ularu et al., “Perspective on Big Data and Big Data Analytics,” 5. 221 Ularu et al., “Perspective on Big Data and Big Data Analytics,” 5. 222 Ghani et al., “Big Data and Data Protection: Issues with Purpose Limitation Principle.” 117. The Big Data,
as many researchers illustrate, “comes into play when vast amounts of raw data generated by a plethora of
different sensors and devices is further stored and processed.” Nikolaus Forgó, Stefanie Hänold and Benjamin
Schütze, “The Principle of Purpose Limitation and Big Data,” in New Technology, Big Data and the Law,
eds. Marcelo Corrales, Mark Fenwick, and Nikolaus Forgó, 17-42, (Singapore: Springer, 2017), 19. 223 Ghani et al., “Big Data and Data Protection: Issues with Purpose Limitation Principle.” 118.
An Ethical Rethinking of Workplace Surveillance
257
One of the principles involved in the data protection act is the purpose specification and limitation,
which follows the “notice and consent” model.224 According to this model, the collection of data is
only for a specified cause and the collected data should not be further used or processed for any
unstated purposes. The purpose limitation, in principle, “provides that personal data must be
collected for specified, explicit and legitimate purposes and not further processed in a way
incompatible with those purposes.”225 However, Big Data challenges this, as the volume increases,
by enabling “a data analysis using many different algorithms which reveals unexpected correlations
that can be used for new purposes.”226 Forgó et al. doubt in this regard the ability to sufficiently
clarify the intended purpose in data collection itself, and point to the legal and ethical issues of “how
far data can be ‘owned’ (in terms of an absolute property right), and if so who the owner is.
Furthermore, large amounts of data in the hands of one entity raise competition and antitrust law
concerns.”227 For the purpose of this research, we will leave aside the legal aspects and challenges of
Big Data and focus only on the ethical challenges. Thus, this section explores and demonstrates the
challenges of data-subjects.
Inferences about employee behaviour are drawn from automated and often passive data streams like
various automatic sensors (e.g., cell phones, cars, etc.), and one can readily see a creeping extension
of controlling surveillance into the public and private lives of employees. Kirstie Ball et al., analysing
through the lens of proximity and criticising these digitally mediated relationships, illustrate the
implications of Big Data practices on surveilled subjects.228 Going beyond the Foucauldian treatment
of the direct gaze, Ball et al. focus, not on relationalities, but on the intersecting proximities between
subjects themselves and big data surveillance practices. According to them with the collection and
process of Big Data, “the surveillance subject is now much more closely but sometimes unknowingly
enmeshed in surveillance assemblages and subject to multiple lines of sight by virtue of latter’s
ubiquity.”229 This poses two challenges in the workplace: on the one hand, apart from a direct gaze,
here the subject is caught (politically or economically) in relationship with those who collect and use
the data; on the other hand, these are mediated through electronic devices.230 The ethical implications
of these two arguments are self-explanatory as the research in the previous chapters has shown.
One of the challenges that electronic surveillance and the collected data bring forth in line with
proximity, with its shared presence and embodied sense of nearness, is the chiasm between the self
and the data streams, which emerges often without the conscious knowledge of the subject.231 This
digitally mediated proximity, according to Ball et al., without consciousness on the part of the subject
and without conscious inter-relationality of the surveillant other and the surveilled subject, intensifies
the reductionism of the subject.232 In the same context, referring to Merleau-Ponty, they argue that
“one’s physical body, ‘le corps propre,’ is not merely an object but also an enduring condition of
224 Ghani et al., “Big Data and Data Protection: Issues with Purpose Limitation Principle.” 119. 225 Forgó, Hänold and Schütze, “The Principle of Purpose Limitation and Big Data,” 17. 226 Ghani et al., “Big Data and Data Protection: Issues with Purpose Limitation Principle.” 119. According to
Ghani et al., “Big data involves reuse of data which it leads to repurpose data. […] In addition to repurpose,
big data analytics also has the potential to create a new personal data.” Ghani et al., “Big Data and Data
Protection: Issues with Purpose Limitation Principle.” 119-120. 227 Forgó, Hänold and Schütze, “The Principle of Purpose Limitation and Big Data,” 19. 228 Kirstie Ball, MariaLaura Di Domenico and Daniel Nunan, “Big Data Surveillance and the Body-subject,”
Body & Society 22, no. 2 (2016): 58-81. In this work, Big Data Surveillance and the Body-subject, Ball et al.
interpret the Big Data surveillance through the subject’s proximity with data flows, analysing the idea of
Merleau-Ponty, Levinas and Coecklberg. 229 Ball, Di Domenico and Nunan, “Big Data Surveillance and the Body-subject,” 65. 230 Ball, Di Domenico and Nunan, “Big Data Surveillance and the Body-subject,” 65. 231 Ball, Di Domenico and Nunan, “Big Data Surveillance and the Body-subject,” 67. 232 Ball, Di Domenico and Nunan, “Big Data Surveillance and the Body-subject,” 69, 72-73.
An Ethical Rethinking of Workplace Surveillance
258
experience and perception.”233 Through data, therefore, the subject is exposed to surveillance in an
embodied and contested way, which again reduces him or her as a person. Body analysis is
significant, therefore, not so much because it is the source of surveillance, but because when the
digital abstractions produced by collected data represent the surveilled people, it has intense effects
for the embodied self. Similarly, they continue, “the more of the lived body that is remediated into
information flows the more value is created for those who want that information. […] [However]
this may not coincide with an individual’s lived, embodied identity and their sense of morality.” 234
Therefore, Big Data not only collects and stores data in high volumes, but also forces the surveilled
subject to live in an altered way, integrating new practices in the embodied lives.
The ethical paradox of the disappearing body, according to Lyon, has been explained already in
previous chapters. For Lyon, bodies disappear due to the creation of “data-subjects,” rendering
individuals increasingly mobile and invisible.235 When data represents bodies, bodily activities and
embodied behaviours, subjects disappears through abstractions. The visible features of the body are
represented through digital, often textual and informational codes, and the subject is reduced to a
virtual, symbolic form. According to Lynsey Dubbeld, “[t]he particulars of the embodied human
actor are therefore left behind: the electronic representations are uncoupled from the physical person,
and acquire an independent existence detached from the individual.”236 So, through surveillance the
physical body is translated into digital data with a virtual representation. All of these negative
assessments further demonstrate the ethical undesirability of persistent workplace surveillance. The
lived body is also a social object, and human embodiment is highly significant to the constitution and
the sustenance of the social world. However, the body is beyond the category of social object or even
the subject whose identity is created by the social world in and of itself and thus is a ‘body-subject,’237
not merely the ‘data-subject’ created through representation.
At this point of the research, from a converging employee perspective compiling various employee
reactions towards monitoring practices and technologies, and from the analysis of the individual and
social right perspectives explored in previous chapters, we can say with confidence that ubiquitous
surveillance in the organizational workplace, especially in IT, ITeS, and BPO sectors, is widely held
to be unethical and unfair. The converging understanding of the ethical principles in the previous
section points to the same. This view must, therefore, be reviewed for further ethical implications.
Of primary concern is the assault on privacy and promotion of social sorting and discrimination
through power distance. Management exhibits an incessant drive to control the workplace. Richard
S. Rosenberg reminds us once again that:
From the early practice of monitoring keystrokes to the current tracking of websites visited, the
office had become as controlled and controlling as the factory floor from the days of the first
233 The French origin le corps proper of Merleau-Ponty is translated as the proper body. They refer also to the
body as ‘la chair du monde,’ an ontology of ‘the flesh of the world’ of Merleau-Ponty. Ball, Di Domenico
and Nunan, “Big Data Surveillance and the Body-subject,” 73-74. Cf. Maurice Merleau-Ponty, The Visible
and the Invisible, ed. Claude Lefort, trans. Alphonso Lingis (Evanston, IL: Northwestern University Press,
1968); Maurice Merleau-Ponty, “Eye and Mind,” in The Primacy of Perception, ed. James E. Edie, trans.
Carleton Dallery (Evanston, IL: Northwestern University Press, 1964), 159–190. 234 Ball, Di Domenico and Nunan, “Big Data Surveillance and the Body-subject,” 74. 235 Lyon, Surveillance Society: Monitoring Everyday Life, 16. It is said as paradoxical as body appears as the
focus of observation and disappears during this process. Lynsey Dubbeld, “Observing Bodies, Camera
Surveillance and the Significance of the Body,” Ethics and Information Technology 5 (2003): 152. 236 Dubbeld, “Observing Bodies, Camera Surveillance and the Significance of the Body,” 152. Representation
is always related to technological element in the surveillance practice. It shows that the data through
surveillance technologies re-present the data subject. 237 Kirstie Ball, “Organization, Surveillance and the Body: Towards a Politics of Resistance,” Organization
12, no. 1 (2005): 96.
An Ethical Rethinking of Workplace Surveillance
259
assembly line. It may have been naïve to assume that the computer and its associated technologies
would liberate workers to contribute more fully of their talents and expertise. In some areas of
work such liberation is in fact taking place, but for many workers the workplace offers little in the
way of exercising individual creativity but much in the way of creating ethical concerns and
challenges.238
On-the-job monitoring is even more extended now to off-the-job surveillance, and there is no safe
place for the workers, as we have already seen. The use of GPS and RFID increases this challenge
and thus monitoring goes beyond the traditional workplace. Rosenberg quotes Jill Andreskey Fraser,
who rightly points out that “[t]echnological developments […] have permitted corporations to extend
their control over employees to an oppressive degree: all in the interest of keeping men and women
at maximum productive efficiency, whether they find themselves in their cars or commuter trains,
hotel rooms, or even the master bedroom.”239 Employees cannot escape from the snooping gaze of
their employers even off-the-job. Due to this on-the-job and off-the-job surveillance, the rights of
employees – at once individual (privacy, autonomy, dignity), organizational (safe workplace, free
from physical or mental harassment, due process) and social (impartial and equal treatments, freedom
of association) – have been thoroughly compromised.
A phenomenographic understanding of employee surveillance, illustrated in the previous chapter, is
valuable to consider at this moment, as it deals with qualitatively different experiences of employees
in this matter, explained in terms of categories of descriptions.240 It gives an interpretative
description, taking an introspective approach,241 of the qualitatively different ways in which
employees perceive and experience the phenomenon of electronic surveillance. The exploratory
study conducted as part of this research shows the adverse effects of surveillance on employee
attitudes, job commitment and satisfaction and moral behaviour. Researchers have already expressed
that monitoring is not “being used in a way that helps train new employees or helps people improve
the quality of service, but rather as an electronic whip, as a means of harassment or as a way of
intimidating workers.”242 It also shows that variables like employee efficiency, commitment, trust
and performance rarely improve due to external monitoring or control systems in the workplace.
Moreover, our study found that the “human” aspects of employees, along with the quality of their
human existence,243 are overlooked and thus persistently forgotten or disregarded by the ontological
insecurity produced by the surveillance systems.
At this stage of the research, having shown that ubiquitous surveillance in the workplace is often
unethical or a practice requiring rethinking from an employees’ perspective or a person-oriented
approach, we need to further explore this phenomenon by taking into account all of the factors and
interests of the employee-employer relationship and managerial patterns or models. We need, that is,
a new management framework and paradigm in order to make an adequate response, and we will
aim to provide this in the next chapter. However, before entering into the discussion of current
management models and the search for an alternative, it is important to see what religion can offer
238 Richard S. Rosenberg, “The Technological Assault on Ethics in the Modern Workplace,” in The Ethics of
Human Resources and Industrial Relations, eds. John W. Budd and James G. Scoville (Champaign, IL:
Labour and Employment Relations Association, 2005), 142. 239 Rosenberg, “The Technological Assault on Ethics in the Modern Workplace,” 142-143. Cf. Jill Andreskey
Fraser, White-Collar Sweatshop: The Deterioration of Work and Its Rewards in Corporate America (New
York: W. W. Norton & Company, Inc., 2001), 76. 240 Marton, “Phenomenography,” 180; Khan, “Phenomenography,” 34. 241 Richardson, “The Concepts and Methods of Phenomenographic Research,” 57. 242 G. Stoney Alder, “Ethical Issues in Electronic Performance Monitoring: A Consideration of Deontological
and Teleological Perspectives,” Journal of Business Ethics 17, no. 7 (1998): 735. 243 Brown, “Ontological Security, Existential Anxiety, and Workplace Privacy,” 65.
An Ethical Rethinking of Workplace Surveillance
260
to the ethics of workplace and employee management. For religion is said to be a social institution
that has a vital influence on attitudes, values and behaviours that each person possesses and performs
in a given situation. Researchers also point to the vital role that religion plays in human interactions
in various ways.244 In the following, let us consider how religion impacts an individual’s behaviour
and performance in organizations and what managerial framework can be extracted from it.
6.3 AN AMALGAMATION OF AN EMBEDDED RELIGIOUS-ETHICAL FRAMEWORK
The question now is whether religion and/or spirituality can play an interactive and integrative role
in the creation of an adequate ethical framework that reaches beyond narrowly legal or regulatory
approaches. To those who question the need to turn to religion and religious perspectives to seek
ultimate morals and values and promote religion as one of the fundamental sources of ethical
behaviour of individuals, Victor van Bijlert provides two sociological observations: “(a) the great
world religions of Christianity, Islam, Hinduism, and Buddhism have large followings, and are more
universal in aim and intent than political or social ideologies; (b) unlike ideologies, world religions
address (or claim to address) issues of ultimate human concern such as life, death, good, evil, and
the hereafter.”245 Besides, Bijlert states that since religions have been providing and still provide
values and moral principles to millions around the world regardless of any demographic or other
such differences and discriminations, religions have a major impact on value discourses of any kind
and religious texts can be sources for ethics in business and politics.246 Within the organization, along
with organizational values, ethical behaviour in the workplace is perceived as an extension of
individual morals and norms, which are also affected by their own religious and spiritual beliefs and
practices.247 So, we can see an interdependent relationship between religious beliefs and practices
and ethical behaviours in organizations.
In a survey conducted worldwide by the World Economic Forum, among 130,000 respondents, only
21% acknowledged religion or faith as the primary source of their personal values.248 Despite this
limited number, “religious thought, whether conscious or not, is a latent variable that often shapes
and informs both personal and social ethics.”249 It thus needs to be taken into account. A half a century
ago, reflecting on religion and business, James W. Culliton stated that “religion has something to
offer business” and argued that both can benefit from knowing each other better.250 This meaningful
244 Ahmad Rafiki and Kalsom Abdul Wahab, “Islamic Values and Principles in the Organization: A Review of
Literature,” Asian Social Science 10, no. 9 (2014): 1. 245 Victor van Bijlert, “Hinduism, Values and Management,” Research & Reports, IIAS News Letter 33 (March
2004): 23. 246 Bijlert, “Hinduism, Values and Management,” 23. 247 Sana Moid, “A Theoretical Construct of the Impact of Religious Beliefs on Accounting Practices in the
Indian and Global Context,” NMIMS Management Review 31 (2016): 92. Sarah Drakopoulou-Dodd and Paul
Timothy Seaman, “Religion and Enterprise: An Introductory Exploration,” Entrepreneurship Theory and
Practice 23, no. 1 (1998): 71-86. 248 Timothy Ewest, “Christian Identity as Primary Foundation to Workplace Ethics,” Religions: A Scholarly
Journal 12 (2015): 23. World Economic Forum, “Why Care about Faith?” Global Agenda Council on the
Role of Faith, 2014.
http://www3.weforum.org/docs/GAC/2014/WEF_GAC_RoleFaith_WhyCareAboutFaith_Report_2014.pdf
[accessed October 30, 2017]. 249 Miller and Thate, “Are Business Ethics Relevant?” 167. 250 James W. Culliton, “Business and Religion,” Harvard Business Review 27, no. 3 (1949): 265. For further
reference: Scott J. Vitell, “The Role of Religiosity in Business and Consumer Ethics: A Review of the
Literature,” Journal of Business Ethics 90 (2009): 155. Researchers argue that in many occasions, religion is
perceived as a determinant of the moral values as the moral teachings of every religion approve only ethical
actions and do not tolerate unethical behaviour. Tisha L.N. Emerson and Joseph A. Mckinney, “Importance
of Religious Beliefs to Ethical Attitudes in Business,” Journal of Religion and Business Ethics 1, no. 2 (2010):
2. There are number of researches expressing a positive correlation of religion with ethical standards. For
An Ethical Rethinking of Workplace Surveillance
261
and significant influence of religion on business decisions and ethical judgements suggests that “the
strength of religious beliefs might result in differences in one’s decision making processes when
facing business decisions involving ethical issues.”251 In the same way, it is widely acknowledged
that “religiosity contributes to entrepreneurial success by moderating the relationship between the
pursuit of material wealth and resulting personal satisfaction and the personal satisfaction in business
is influenced by the belief on the religious values that they follow.”252 Moreover, religious
individuals, whose morality is influenced by their religion, generally seem to possess a deep longing
to take up larger social responsibilities in the workplace and in business.253 All these studies show
that human religiosity, in whatever dimensions of religious affiliation, activity and belief, can
constitute a spirituality among individual employees and enables them to see the world and self in
that framework.254 As such, it influences attitudes and behaviours in organisations.
The research of Gary R. Weaver and Bradley R. Agle indicate that religious role expectations, which
people internalize as religious self-identity moderated by religious motivational orientations,
influence an individual’s ethical behaviour.255 Weaver and Agle address the relationship between
religion and different behavioural and affective phenomena, discussing the variations in personality
traits, coping abilities and strategies, health stability on an individual level and social and political
behaviours on a social level. A positive relationship between religiosity and ethical business or
organizational behaviour is empirically observed.256 Yet some researchers criticize the focus on a
narrow link between moral reasoning and religious reasoning. According to these experts, both are
“unrelated as they represent two distinct ways of thinking,” in which the latter “is based upon rational
arguments and influenced by cognitive development” and the former “is based upon the revelations
of religious authorities.”257 However, most researchers acknowledge a close link between these two
constructs, arguing that “one’s moral reasoning depends, in part, upon the seriousness and character
of one’s religious commitment.”258 In the same way, a study conducted by Siu, et al., examining the
instance, the positive relationship between religious beliefs and ethical attitudes is found by Terpstra et al.,
Smith and Oakley, Conroy and Emerson, and so on. Cf. David E. Terpstra, Elizabeth J. Rozell and Robert K.
Robinson, “The Influence of Personality and Demographic Variables on Ethical Decisions Related to Insider
Trading,” The Journal of Psychology 127, no. 4 (1993): 375-89; Patricia L. Smith and Ellwood F. Oakley,
“The Value of Ethics Education in Business School Curriculum,” College Student Journal 30 (1996): 274-
83; and Stephen J. Conroy and Tisha L. N. Emerson, “Business Ethics and Religion: Religiosity as a Predictor
of Ethical Awareness among Students,” Journal of Business Ethics 50, no. 4 (2004): 383-396. 251 Vitell, “The Role of Religiosity in Business and Consumer Ethics,” 155. Hunt, Shelby D. and Scott J. Vitell,
“The General Theory of Marketing Ethics: A Retrospective and Revision,” in Ethics in Marketing, eds. N.
Craig Smith and J. A. Quelch (Homewood, IL: Irwin Inc., 1993), 775–784. 252 Binod Krishna Shrestha, “Religious Ethics and Socially Responsible Behaviours of Small Firms in Nepal,”
Journal of Religion and Business Ethics 3, no. 2 (2017): 1. Cf. Bellu Renato and Fiume Peter, “Religiosity
and Entrepreneurial Behaviour: An Exploratory Study,” International Journal of Entrepreneurship and
Innovation 5, no. 3 (2004): 191-201. 253 Shrestha, “Religious Ethics and Socially Responsible Behaviours of Small Firms in Nepal,” 1. Cf. Brammer
Stephen, Williams Geoffrey and Zinkin John, “Religion and Attitudes to Corporate Social Responsibility in
a Large Cross-Country Sample,” Journal of Business Ethics 7, no. 1 (2007): 229-243. 254 Vitell, “The Role of Religiosity in Business and Consumer Ethics,” 156. Cf. Dana Bjarnason, “Concept
Analysis of Religiosity,” Home Health Care Management and Practice 19, no. 5 (2007): 350-355. 255 Gary R. Weaver and Bradley R. Agle, “Religiosity and Ethical Behaviour in Organizations: A Symbolic
Interactionist Perspective,” Academy of Management Review 27, no. 1 (2002): 77-97. 256 Weaver and Agle, “Religiosity and Ethical Behaviour in Organizations,” 80-82. 257 Vitell, “The Role of Religiosity in Business and Consumer Ethics,” 156. Cf. Kohlberg, Lawrence. The
Meaning and Measurement of Moral Development (Massachusetts: Clark University Press, 1981). 258 Vitell, “The Role of Religiosity in Business and Consumer Ethics,” 156. Cf. Rebecca J. Glover,
“Relationships in Moral Reasoning and Religion among Members of Conservative, Moderate, and Liberal
Religious Groups,” The Journal of Social Psychology 137, no. 2 (1997): 247-254; Conroy and Emerson,
“Business Ethics and Religion: Religiosity as a Predictor of Ethical Awareness among Students,” 383-396;
An Ethical Rethinking of Workplace Surveillance
262
relationship between religiousness and ethical orientations of business people, also observes that
“individuals who are more religious were also more oriented toward ethics and ethical issues.”259
This means that an individual’s personal religion and religious reasoning, or in other words their
religiosity, influences both one’s personal characteristics and one’s ethical decisionmaking process.
In a study on the Importance of Religious Beliefs to Ethical Attitudes in Business, Tisha L. N.
Emerson and Joseph A. Mckinney argue that religion is a determinant of ethical attitudes in
questionable situations.260 They begin with all world religions’ moral teachings and disapproval of
unethical actions and argue that religion can influence the recognition of ethical issues (moral
sensitivity), ethical decisions (moral judgment), intention to act (moral intention), and actual
behaviour (moral behaviour).261 Domènec Melé refers to the ethical ideas traced from various
religion’s tradition, such as Judaism, Christianity, Islam, Hinduism, Buddhism, etc.262 According to
him, the teachings of all these religions highlight religious and ethical norms as the guiding principles
of business activities, as they see work in a human-divine partnership model, where human dignity
and concern for persons such as justice are crucial.263 Various religious traditions, spirituality,
teachings and practices function as a dynamic tool to develop personal and social ethics as needed to
respond to complex situations in the workplace.
Though there is a conceptual distinction between religion and spirituality,264 they do have many
functional and substantive commonalities, and “the experience of spirituality for many, indeed most,
people remains embedded within a religious context.”265 In what follows, we explain religion and
and Justin G. Longenecker, Joseph A. McKinney and Carlos W. Moore, “Religious Intensity, Evangelical
Christianity, and Business Ethics: An Empirical Study,” Journal of Business Ethics 55, no. 4 (2004): 373-86. 259 Vitell, “The Role of Religiosity in Business and Consumer Ethics,” 160. Cf. Noel Y. M. Siu, John R.
Dickinson and Betsy Y. Y. Lee, “Ethical Evaluations of Business Activities and Personal Religiousness,”
Teaching Business Ethics 4, no. 3 (2000): 233-256. 260 Tisha L. N. Emerson and Joseph A. Mckinney, “Importance of Religious Beliefs to Ethical Attitudes in
Business,” Journal of Religion and Business Ethics 1, no. 2 (2010): 1-15. 261 Emerson and Mckinney, “Importance of Religious Beliefs to Ethical Attitudes in Business,” 10. 262 Domènec Melé, “Religious Foundations of Business Ethics,” in The Accountable Corporation, Vol. 2, eds.
Mark J. Epstein and Kirk O. Hanson (London: Praeger, 2006), 11-43. 263 Melé, “Religious Foundations of Business Ethics,” 11-43. 264 Few researchers make conceptual distinction between religion and spirituality: “religion is more community
focused while spirituality tends to be more individualistic; religion is more observable, measurable, and
objective while spirituality is less visible and quantifiable and more subjective; religion is more formal,
orthodox, and organized while spirituality is less formal, less orthodox, and less systematic; religion tends to
be behaviour-oriented with an emphasis on outward practices while spirituality tends to be more emotionally
oriented and inwardly directed; religion is more authoritarian, especially in terms of behaviours while
spirituality is less authoritarian and has little external accountability; and religion is more oriented toward
doctrine, especially that which distinguishes good from evil while spirituality stresses harmony and unity and
is less concerned with doctrine.” Peter C. Hill and Gary S. Smith, “Coming to Terms with Spirituality and
Religion in the Workplace,” in Handbook of Workplace Spirituality and Organizational Performance,” eds.
Robert A. Giacalone and Carole L. Jurkiewicz, 231-243 (Armonk: M.E. Sharpe, 2003), 233. 265 Hill and Smith, “Coming to Terms with Spirituality and Religion in the Workplace,” 234. They bring
research evidences to argue for the overlapping identities of religion and spirituality among people by way of
introducing a sacred core, a sacred dimension of life giving a sense of meaning of life beyond the self and
mundane concerns. Religious adherences, beliefs systems and practices along with subsequent spirituality
enable a person within the organization to act with higher sense of responsibility, commitment and increase
the greater personal and organizational growth. According to Richard D. White, Jr., “a spiritually healthy
workplace positively influences employee and organizational performance. Spiritual health leads people to
experience consciousness at a deeper level, improves their intuitive skills, encourages teamwork, develops
more purposeful and compelling organizational vision, and boosts innovation.” Richard D. White, Jr.,
“Drawing the Line: Religion and Spirituality in the Workplace,” in Handbook of Workplace Spirituality and
Organizational Performance,” eds. Robert A. Giacalone and Carole L. Jurkiewicz, 244-256 (Armonk: M.E.
Sharpe, 2003), 244.
An Ethical Rethinking of Workplace Surveillance
263
spirituality as central features of many people’s lives that regulate how they think and act, including
in situations like that of workplace surveillance. Since we have analysed workplace scenarios of the
Indian context in the second chapter to situate this research, the Hindu view of moral standards that
influence managerial acts in the workplace is explored here in detail, followed by a brief description
of other religious tenets. Then, a detailed analysis of Catholic Social Teaching is given, as this will
be the basis for the personalist management framework that this research proposes in the final chapter
as an alternative to current models of workplace management. All these religious references support
a person-centered ethical approach to employee management.
6.3.1 The Hindu View of Moral Standards in Management Ethics
Moral standards are generally influenced by several factors, including “moral principles we accept
as part of our upbringing, values passes on to us through heritage and legacy, the religious values
that we have imbibed from childhood, the values that were showcased during the period of our
education, the behaviour pattern of those who are around us, the explicit and implicit standards of
our culture, our life experiences and more importantly, our critical reflections on these
experiences.”266 Since religion provides its followers with a “set of moral instructions, beliefs, values,
traditions and commitments,” people perceive and believe that morality also emanates from
religion.267 There is no single source of moral standards in Hinduism, for it encompasses values from
various religious beliefs and practices, as illustrated in works such as the Ramayana, Mahabharata,
Bhagavad Gita, etc. and also accrued from other religious traditions including Buddhism, Sikhism,
Jainism, and Zoroastrianism.268 A strong interrelationship between religious thought and economic
activity is foreshadowed in all Indian business scenarios. According to researchers, “the rich culture
of India, immersed in spirituality and religion, is focused on intuitive ethical decision making and
the rule of man, which sets it apart from the western analytical approach to ethical decision making
based on norms and the rule of law.”269 Hinduism, being a prominent religion in India, provides
ethical roots for economic, business and managerial ethics.
Although religions like Hinduism and Buddhism have individual enlightenment as their predominant
consideration,270 their ethical guidelines and spiritual practices for the enlightened life of all humanity
offer significant guidance for economic and managerial activities, as these are an inevitable part of
human life and well-being. An ethical principle of the Karma theory of Hinduism, that “one is
responsible for one’s actions and the individual alone must bear the consequences of those actions in
the future,”271 causes individuals to discipline and regulate their activities. Researchers have noted
that the “religious enforcement mechanisms” practiced in India emphasize the vitality of applying
266 Fernando, Business Ethics: An Indian Perspective, 31. 267 Fernando, Business Ethics: An Indian Perspective, 31. 268 Colin Fisher and Alan Lovell, Business Ethics and Values: Individual, Corporate and International
Perspectives (England: Pearson Education, 2009), 442. Fernando, Business Ethics: An Indian Perspective,
31. 269 Ron Berger and Ram Herstein, “The Evolution of Business Ethics in India,” International Journal of Social
Economics 41, no. 11 (2014): 1075. Cf. Alexandre Ardichvili, Douglas Jondle, Brenda Kowske, Edgard
Cornachione, Jessica Li, and Thomas Thakadipuram, “Ethical Cultures in Large Business Organizations in
Brazil, Russia, India, and China,” Journal of Business Ethics 105, no. 4 (2012): 415-428. 270 Juliana Essen, “Sufficiency Economy and Santi Asoke: Buddhist Economic Ethics for a Just and Sustainable
World,” Journal of Buddhist Ethics 17 (2010): 70-99. Berger and Herstein, “The Evolution of Business Ethics
in India,” 1076. 271 Berger and Herstein, “The Evolution of Business Ethics in India,” 1077. Cf. Praveen K. Kopalle, Donald
R. Lehmann and John U. Farley, “Consumer Expectations and Culture: The Effect of Belief in Karma in
India,” Journal of Consumer Research 37, no. 2 (2010): 251-263
An Ethical Rethinking of Workplace Surveillance
264
ethical strands in all areas of life, including business and management.272 The ethical principles of
Hinduism, some of which we explain in the following, enable organizations to conduct business by
adhering to a high personal value system that forms a strong ethical infrastructure for business. All
Hindu religious thinking and philosophy leads to the creation of general principles of ethical conduct
and ethical management, both seeking individual well-being and organizational development.
Though management generally seems to be a universal process, in practice different perceptions have
to be considered as employees invariably have different cultural and religious backgrounds. They are
largely “influenced by attitudes, traits and perceptions which are developed over a period of time as
a result of their cultural affiliations, associations with peers, family and their past experiences.”273
This makes it necessary to look for the particulars of contextual management pertinent to each region
or country, developed through its religious traditions and practices.
In the Indian management context, we find today residual traces of ancient wisdom274 as the present
practices of trade and business face various and multifaceted complexities of global realities, as
discussed above. Today, many are searching for a different, distinctively Indian organizational
management model today because of the problems created by trying to transfer another country’s
model of management, from the West, into India. A dynamic engagement through interdependence
and integration is needed and valued in this situation as a means to grasp the overall performance of
the workplace and management context. For often, cultural differences are more important and
determinative than the commonalities among different countries.275 For example, “too much of
individualism, the principle of maximization of profits at all costs, little concern for values and a
narrow view of life could be some of the major flaws”276 of Western management model, when it is
transferred directly to the more of collectivistic and relationship-based Indian cultural scenario. For,
the Indian management system is based on India’s socio-cultural and economic environment, as well
as the internal environments of any organization functioning in India.
Researchers, in this regard, assert that management is predominantly culture specific and derives also
from religious and faith practices.277 Nigam and Su rightly illustrate this:
In the case of India, the management system is based upon centuries of rules and regulations from
various dominating empires; different religions; a very influential caste system that knowingly or
unknowingly, intentionally or unintentionally, influences the organizational system of Indian
enterprises; the British Raj who rules India for about 200 years; and more recently, the
globalization of world economies and its influence on the Indian management system.278
272 Berger and Herstein, “The Evolution of Business Ethics in India,” 1079. Cf. P. Kanagasabapathi, “Ethics
and Values in Indian Economy and Business,” International Journal of Social Economics 34, no. 9 (2007):
577-585. 273 Carl Osunde, Joshi Ashima, Vyas Anup, and Gargh Shankar, “Management Problems and Practices: India
and Nigeria,” Advances in Management 8, no. 1 (2015): 9. 274 The above-mentioned traces of ancient wisdom are mainly the compiled treaties by Chanakya, an Indian
scholar-practitioner, for human resource practices presented in ‘Arthashastra,’ the first Indian management
writings codified over three millenniums before Christ. It presents “notions of the financial administration of
the state, guiding principles for trade and commerce, as well as the management of people.” Chatterjee,
“Human Resource Management in India,” 92. Along with this, Aryan thoughts and writings called Vedanta
also influence the management values in India, which “nurtured an inner private sphere of individualism”
including the values of responsibility to others – family, group and society. Chatterjee, “Human Resource
Management in India,” 92-93. 275 Kanagasabapathi, Indian Models of Economy, Business and Management, 240. 276 Kanagasabapathi, Indian Models of Economy, Business and Management, 239. 277 Kanagasabapathi, Indian Models of Economy, Business and Management, 237. 278 Nigam and Su, “Management in Emerging versus Developed Countries,” 124.
An Ethical Rethinking of Workplace Surveillance
265
To explain this further, any country or region will have a specific set of approaches to life, different
economic systems, different predominant cultural frameworks, different spiritual and religious
orientations, and differences of temperament, etc., all of which influence business management and
decisionmaking practices.279 For instance, the practice of the caste system, by which people are
categorized into different groups – higher or lower – according to the caste into which they are born,
brings with it a hierarchical mindset and thus a management model of ‘power delegation.’ This
results in a pattern of centralized authority and top-down decision making.280 For in line with our
precious discussion, this caste system and the continued effects of an old feudalistic tendency, created
and prompted by the British Raj promoting inequality in rural and urban population, maintain a
hierarchy, status consciousness, power distance and low individualism in the workplace.281 This
practice and the cultural tendencies in the organization, according to Debi S. Saini and Pawan S.
Budhwar, strengthen a hierarchical superior-subordinate relationship and thus increase social control
over inferiors.282
In different texts such as the Bhagavad Gita, the Arthashastra and the Thirukkural, Indians receive
knowledge and concepts related to management.283 These and other ancient Indian literatures, such
as various Upanishads, Vedas, and Smrutis, along with the Quran and the Bible, serve as a source of
principles and guidelines for the development of good human relations, norms of good governance,
and good communication skills.284 The Indian management style is also marked by different power
aspects such as loyalty, affection, respect and bonding based on the above discussed socio-cultural,
religious and political traditions and customs. This is because of the Indian inheritance of the holistic
vision that it pursues in its engagements with others. To further explicate, apart from the managerial
presupposition of the West that the individual is the central unit of reference, Indian culture perceives
the individual as merely a component part of larger social institutions such as the family, and thus
group efforts are given more importance than individual efforts.285 Kanagasabapathi in this regard
writes that:
Our culture provides us with ‘the cosmic vision’ which, translated in terms of business, amounts
to accepting and owning our social responsibility towards all the stakeholders like share-holders,
employees and their union, consumers, society, government, financial institutions, supplier, etc.,
and beyond, competitors, environment-physical, social, religious, cultural, educational and even
the inanimate kingdom.286
279 Kanagasabapathi, Indian Models of Economy, Business and Management, 238. 280 Nigam and Su, “Management in Emerging versus Developed Countries,” 126. 281 Debi S. Saini and Pawan S. Budhwar, “HRM in India,” in Managing Human Resources in Asia-Pacific, ed.
Pawan S. Budhwar (London: Routledge, 2004), 120. 282 Saini and Budhwar, “HRM in India,” 120. 283 Anindo Bhattacharjee, “Modern Management through Ancient Indian Wisdom: Towards a More
Sustainable Paradigm,” School of Management Science-Purusartha 4, no. 1 (2011): 15; Manish Prasad Rajak,
“Ancient Indian Wisdom in Modern Management: A Review of its Scope and Prospects,” aWEshkar 18, no.
2 (2014): 18-29. 284 Kanagasabapathi, Indian Models of Economy, Business and Management, 242. See also, Yog Raj Singh
and Ankur Bhatnagar, “Management and Business Ethics through Indian Scriptures and Traditions,” 2012,
http://www.managementparadise.com/article/3654/management-and-business-ethics-through-indian-
scriptures-and-traditions [accessed March 10, 2016]. 285 Kanagasabapathi, Indian Models of Economy, Business and Management, 242 -243. 286 Kanagasabapathi, Indian Models of Economy, Business and Management, 243.
An Ethical Rethinking of Workplace Surveillance
266
The whole world is thus seen as a family – Vasudhaiva Kutumbakam287 – and when people interact
with individuals, groups or organizations, this view predominates and this holistic or cosmic vision
gives a new face to the Indian management philosophy. In this concept of universal family-hood,
“individual and collective interests complement each other, and the focus is on caring and sharing
and respect for fellow beings.”288 This spiritual and cultural practice is also a defining feature of
interpersonal relationships in the organizational workplace. For the sustainability and growth of
Indian organizations are deeply rooted in a culture of upward respect, called Sradha (loyalty), of
downward fondness, called Sneha (affection), and of mutual attachment, called Bandhan (bonding)
that arises through the interaction of loyalty and affection in the organization.289 These concepts mark
the distinctiveness of Indian management models.
The ethical values of ancient India, including Dharma (justice righteousness, duty, moral order,
virtues), Artha (wealth, prosperity, success), Kama (worldly desire, pleasure), and Moksha
(liberation or salvation) constitute the ideals of life, provide a solid ethos for work culture, and offer
a broad framework for a new model of organizational management.290 For, this fourfold aim of
human existence is pertinent to whole practical and day-to-day arenas of human life, and everyone
is expected to achieve it disregarding the expectation to get something in return. In this 21st century,
these objectives or ideals – Dharma as conscientious living, Artha as seeking security, Kama as the
art of enjoying pleasures, and Moksha as freedom from all limitations – are becoming more vital, as
they can contribute much to an understanding of organizational behaviour as well.291 Dharma and
Artha allow the generation of wealth or profit so long as it is not done by unjust means. In the same
way, Kama, the attainment of desired pleasure, invariable looks for cardinal rules and values through
the self-disciplined and self-managed efficacy of worldly goods and services. Besides, the concept
of Moksha in this regard can inform the ideology and philosophy of life in any organization or a
corporate body.292 In the same way, a management model based on these ideals, according to Manish
P. Rajak, “stresses on harmonizing the individual goals with the goals of others for bringing harmony
in system; such a system would be highly decentralized and depended on every person following
287 The concept Vasudhaiva Kutumbakam is a Sanskrit phrase meaning “the whole world is one single family.”
Here ‘vasudha’ means Earth; ‘eva’ means emphasize and ‘kutumbakam’ means family. This Sanskrit verse
is from Maha Upanishad (Chapter 6, Verse 72), where we read:
Ayam Bandhurayam Neti Ganana Laghu Chetsam
Udaara Charitaanaam Tu Vasudhaiva Kutumbakam
Only small men discriminate saying: One is a relative; the other is a stranger.
For those who live magnanimously, the entire world constitutes but a family.
It is also a cultural and spiritual concept as vasudhaiva is a state of awareness or consciousness for which love,
harmony, co-operation and mutual support form key features. See, Shashank Shah and V.E. Ramamoorthy,
Soulful Corporations: A Value-Based Perspective on Corporate Social Responsibility (New Delhi: Springer,
2014), 249. 288 Shah and Ramamoorthy, Soulful Corporations, 249-250. 289 Chatterjee, “Human Resource Management in India,” 93-94. 290 These values of Dharma, Artha, Kama, and Moksha are four purusharthas or permissible goals of human
life that constitute a way for happy life on earth. Purusha is an individual or person and Artha means
meaning/objective or pursuit and thus objectives of human life is called purusharthas. This purusharthas is
the basis for human life and central to Indian classical ethics. Every human being has to achieve it with
detachment and renunciation. Alka Mohan Kadam, “Purushartha in 21st Century,” Online International
Interdisciplinary Research Journal 5, no. 4 (2015): 441. Cf., Berger and Herstein, “The Evolution of Business
Ethics in India,” 1078. 291 Kadam, “Purushartha in 21st Century,” 445-447. 292 Anil Rao Paila and P.S. Rao, “Ethics in Business and Indian Value Systems: Need for Integration in the age
of Science and Technology,” in Business Ethics and Human Values, ed. V.M. Chavan (New Delhi: Excel
Books, 2009), 24.
An Ethical Rethinking of Workplace Surveillance
267
Dharma for the attainment of the Purusarthas.”293 The Purusharthas also therefore are held to offer
solid ideals of human ethics as important guidelines for managing organizations in modern times.
In these modern times, over against the hierarchical management approach, which often seems
antagonistic, a more personal management style is now used in many organizational workplaces in
India, one which sees all members as associates and thus is friendlier in dealing with each one.294
This type of person-oriented approach is valued in the workplace in the context of implementing
electronic surveillance as a strategy to manage employees. The owner-labour relationship is fostered
in the context of a higher personal orientation and a fraternal approach that draws employees more
closely togrther, regardless of their professional or socio-economic status.295 In the Indian non-
corporate sector, a ‘holistic’ management style is followed according to which the entrepreneur
shows concern for all parties involved in the firm or transaction by means of direct contact with all
stakeholders. An entrepreneur, in this regard, takes all risks involved and functions as “a financial
expert, a human relations man, a marketing wizard and a production specialist, all at one time”296 to
successfully manage complex situations coming across. Similarly, leaders in the corporate sector in
India by and large try to adapt to modern management styles without losing their traditional value
systems. Moreover, in the corporate sector, both a higher need for updating operations and services
through adoption of the latest technologies and a growing tendency to emulate the West are quite
advanced and developed.
However, a creative and progressive management model that incorporates the nuances of application
and implementation of information and associated technologies will construct and provide for the
effective management of the new workforce by focusing on the well-being of employees through a
person-centered approach. For the contemporary workplace, with its wealth of information and
connectivity, is exemplified perhaps most clearly by the field of IT, with its hyper-specialized fields,
job arenas that are horizontally-networked (less hierarchical) and highly-interconnected, and “less
command-and-control oriented behaviours, with the big data as key basis of competition, growth and
innovation.”297 These emerging new work environments, by adopting advanced technologies that
increase productivity and the quality of life, mark the distinction between traditional and new
management patterns.298 Arun Kumar and Priyadarshini Singh have compiled several principles of
workforce management based on the work of K. Aswathappa, which extends from principles of
individual self-development to the principle of contribution to national prosperity.299 Availing
oneself to realize and actualize own potentials through the responsible utilization of full and equal
opportunities given to him or her, an employee promotes the dignity of labour while also providing
for national prosperity by contributing to it with a team spirit. Principles of labour management
cooperation, the free flow of communication, fair remuneration incentives and the dignity of labour
also all contribute to cordial industrial relations and effective labour management.300 It is interesting
at this juncture to note that Indian work culture and management models are more about performing
293 Rajak, “Ancient Indian Wisdom in Modern Management,”22. It is originally from, Krishan Saigal, Vedic
Management: The Dharmic and Yogic Way (Delhi: Gyan Publishing House, 2000), 63-100. 294 Kanagasabapathi, Indian Models of Economy, Business and Management, 251. 295 Kanagasabapathi, Indian Models of Economy, Business and Management, 251. 296 Kanagasabapathi, Indian Models of Economy, Business and Management, 254. 297 Kumar and Singh, “Principles and Practices of Workplace Management in Information Age,” 24. 298 Kumar and Singh, “Principles and Practices of Workplace Management in Information Age,” 29. 299 Kumar and Singh, “Principles and Practices of Workplace Management in Information Age,” 29-31. See
also K. Aswathappa, Human Resource Management: Text and Cases, 7th ed. (New Delhi: McGraw Hill
Education [India] Pvt. Ltd., 2013), 26. 300 Kumar and Singh, “Principles and Practices of Workplace Management in Information Age,” 29-31.
An Ethical Rethinking of Workplace Surveillance
268
with a comprehensive or holistic worldview and are invariably humane in practice, functioning in a
way that is consistent with Indian religious, socio-cultural and economic orientations.
In a similar manner, India itself, being by its very nature of multiple and outwardly accepting, tolerant
and adaptive to diversities, is largely open to imbibing various approaches and management styles.
According to Jean-Pierre Lehmann, “[t]he planet needs a sense of moral order, spirituality and an
ethical compass. The Indian religious and philosophical traditions can provide a great deal of all
three.”301 Therefore, any critical and ethical analyses of work behaviour and progressive workplace
or labour management in Indian organizations has to be in tune with its above discussed cultural
practices and socio-economic and religious traditions and practices. Therefore, Hinduism contributes
to ethical behaviour in the workplace by applying principles of right social behaviour “based on four
ideals or goals of life: prosperity, satisfaction of desires, moral duty and spiritual perfection by
liberating from a finite existence.”302 These four ideals, according to Shrestha, highlight the human
virtues of “honesty, righteousness, nonviolence, modesty and purity of heart.”303 This framework
enables and engenders the vitality of analysing deep-rooted behavioural patterns of the modern
workplace in Indian organizations and globally, with all its specifics. For the new organizational
environment does not exhibit a conventional fixed set of behavioural platforms, but rather a complex,
dynamic web where people need to interact with each other for effective work performance.
6.3.2 Ethical Tenets of Other Major Religions
Analysis of other major religions must firstly focus on Buddhism, from which, although it has a
predominant concern for individual enlightenment, as in the case with Hinduism, one can derive
ethical guidelines for peoples’ economic and social activities that promote a more socially just way
of being in the world.304 Though the Buddhist model looks to individual (self) rational choices for
the improvement of material wellbeing, it goes beyond the ‘means-end’ rationality or the ‘economic
man’ model of the enlightenment era and acknowledges that the self is connected with other entities,
not isolated.305 Buddhism also states, in this regard, that any action done by individuals has
consequences, resulting in a kammic boomerang.306 Kamma is the Pali term for Karma, and means
that all actions driven by intention carry future consequences. Without stopping at the satisfaction of
a demand, as in the rational process of neoclassical economic man, Buddhist reflection “would first
factor into his or her choices the possible effects on all spheres of human existence: individual,
society and nature.”307 The Buddhist model aims to achieve individual well-being, which looks
beyond material well-being to the attainment of the ultimate spiritual goal of nibbãna (in Sanskrit
nirvāṇa), which indicates a soteriological release from rebirth in saṃsāra – the beginningless cycle
301 Jean-Pierre Lehmann, “The Dangers of Monotheism in the Age of Globalization,” The Globalist, March 30,
2006. http://www.theglobalist.com/dangers-monotheism-age-globalization/ [accessed March 10, 2016]. See
also Kanagasabapathi, Indian Models of Economy, Business and Management, 280. 302 Shrestha, “Religious Ethics and Socially Responsible Behaviours of Small Firms in Nepal,” 4. 303 Shrestha, “Religious Ethics and Socially Responsible Behaviours of Small Firms in Nepal,” 4. 304 Juliana Essen, “Sufficiency Economy and Santi Asoke: Buddhist Economic Ethics for a Just and Sustainable
World,” Journal of Buddhist Ethics 17 (2010): 71. 305 Essen, “Sufficiency Economy and Santi Asoke,” 73. 306 Essen, “Sufficiency Economy and Santi Asoke,” 73. The concept Kamma (Karma in Sanskrit) speaks about
the moral low of actions in Buddhism. Though generally the moral law of action is termed as Kamma-Vipaka,
in which Kamma is the action and Vipaka the result, the term Kamma is also used to cover both actions and
results. Sri Dhammananda Maha Thera explains the term Kamma as “an impersonal, natural law that operates
in accordance with our actions,” a law in itself having no lawgiver and “operates in its own field without the
intervention of an external, independent, ruling agent.” Dhammananda Maha Thera, “What is Kamma?”
Buddha Sasana, https://www.budsas.org/ebud/whatbudbeliev/87.htm [accessed February 28, 2018]. Kamma
simply means “do good and good will come to you.” 307 Essen, “Sufficiency Economy and Santi Asoke,” 73.
An Ethical Rethinking of Workplace Surveillance
269
of birth and death.308 This model enables individuals to get rid of their negative desires, which
according to Buddhism is the source of suffering. For Buddhism distinguishes two kinds of desires,
viewing one negatively - tanha - and the other positively - chanda. The former “is ignorant craving
for pleasurable feelings associated with both the tangible and intangible such as status or fame,”
whereas the latter “is positive desire for wellbeing and benefit.”309 The positive desire “is based on
pañña or intelligent reflection and leads to right effort and action [and] that economic activity can
and should be prompted by this form of desire - and possibly by the more specific desire to turn
money into merit.”310 It urges individuals to perform productive or livelihood activities to satisfy
their positive desires.
Right livelihood, one step on the Eightfold Path of Buddhism, is guided by this positive desire and
“allows individual to keep the five basic householder precepts (to abstain from killing or harming
life, lying, stealing, engaging in sexual misconduct, and consuming sense-altering substances).”311
Vamsapala calls right livelihood “Balance Life,” one that avoids dishonest livelihood.312 According
to Juliana Essen, this right livelihood in Buddhism requires diligence and implies self-reliance.313 It
enables individuals to “work together more harmoniously by controlling thoughts, feelings, speech
and action according to the Eightfold Path [by which] as individuals’ mental states improve, so too
does the quality of their work and social interactions.”314 This leads to a functional ethic of the
workplace from a Buddhist perspective. P. A. Payoutta speaks about three interconnected aspects of
human existence to which Buddhist’s economic principles are related: “human beings, society and
the natural environment,” and states that by promoting harmony and being mutually supportive,
“[e]conomic activity must take place in such a way that it doesn't harm oneself (by causing a decline
in the quality of life) and does not harm others (by causing problems in society or imbalance in the
environment).”315 In other words, within the ethical perspective of the Buddhist model, what is good
and right for oneself is also good and right for others.
Along with ethical qualities “based on loving, kindness, compassion and altruistic joy through the
welfare of others,” the Buddhist model of ethical behaviour in the workplace “focuses on moral
imperatives such as earning rightfully, use of resources correctly and market appropriately [and]
views the function of work as a chance to utilize and develop one’s and others’ faculties and to bring
needed goods and services into existence.”316 For business and the workplace, it contributes and a
308 Nibbãna is a Pali word for Sanskrit nirvāṇa and is formed of Ni and Vana. Ni is a negative particle
and vana means lusting or craving.” It is “a departure from the craving which is called vana, lusting.” The
word Nibbãna literally means non-attachment. It may also be defined as “the extinction of lust, hatred and
ignorance.” However, it is neither a mere nothingness nor a state of annihilation, but what it is no words can
adequately express. Nibbãna is a Dhamma which is “unborn, unoriginated, uncreated and unformed.”
Therefore, Nibbãna is “eternal (dhuva), desirable (subha), and happy (sukha).” Narada Tera, “Buddhism in
a Nutshell,” Buddha Dharma Education Association, 2012, http://www.buddhanet.net/nutshell10.htm
[accessed February 28, 2018]. 309 Essen, “Sufficiency Economy and Santi Asoke,” 74. 310 Essen, “Sufficiency Economy and Santi Asoke,” 74. 311 Essen, “Sufficiency Economy and Santi Asoke,” 74. Cf. E.F. Schumacher, Small is Beautiful: Economics
as if People Mattered (New York: Harper & Row, 1973). 312 Vamsapala, “Buddhist Economic Ethics,” http://vamsapala.blogspot.be/2013/07/buddhist-economic-
ethics.html [accessed February 28, 2018]. 313 Self-reliance in the workplace and in business looks for more caring of the human nature than any growth-
oriented perspective. 314 Essen, “Sufficiency Economy and Santi Asoke,” 75. 315 P.A. Payutto, Buddhist Economics: A Middle Way for the Market Place, trans. Dhammavijaya and Bruce
Evans, comp. Bruce Evans and Jourdan Arenson, 1994,
http://pioneer.netserv.chula.ac.th/~sprapant/Buddhism/buddhist_econ.html [accessed February 28, 2018]. 316 Shrestha, “Religious Ethics and Socially Responsible Behaviours of Small Firms in Nepal.” 6. One of the
significant characteristics of Buddhism is that it “accepts the importance of all levels of happiness in life,
An Ethical Rethinking of Workplace Surveillance
270
“compassion-based collectivism,” promoting unselfish individual behaviour for the benefit of the
whole community317 and securing wealth rightfully, “without exploitation but through effort and
intelligent action.”318 The Buddhist model thus looks for activities for both the individual and
organizations that achieve tranquillity and maximise organizational and thus social well-being.
Buddhist economic thought and practice increasingly reunite with a human ethic that is more true to
human nature319 and speaks about an alternative economic and management model based on
religious, spiritual, environmental, and humanistic values. The Buddhist model also proposes the
principle that one should “do no harm to others” and thus encompasses all humankind. This
humanistic view will be developed in the next chapter to bring about an ethical alternative to
employee management models.
Secondly, we may consider Sikhism. As an egalitarian religion, Sikhism preaches love, truthful
living, equality, liberty, etc. and works for the peace and prosperity of the whole world. Sikhism
holds that many ethical practices are done thanks to the God-fearing attitude each person
possesses.320 Mruthyunjaya illustrates that this God concept in Sikhism is further emphasised
“through holding of one’s duties towards man with total sincerity, integrity and in the highest esteem
as the noblest route towards God and through implanting a deep seated feeling that God has given
this human life only to serve other fellow human beings with love, affection, compassion and
humility filled with a sense of selflessness.”321 Its message for human or spiritual development
teaches about the self-discipline and control each person needs to possess, “as only a person who can
control his mind and reactions can control/manage an organization and people in it and attain
managerial excellence.”322 In the same way, one of the premises of Sikhism is that the dignity of
individuals must be defended and sustained “through total freedom from discrimination and abuse”
and “total righteousness through actions and practices” must be practiced.323 It looks for
“contentment, humility and humbleness in life” and thus seeks “complete freedom from excessive
desire and greed which is responsible for all forms of unethical activities.”324 Sikhism thus believes
that God, the supreme power, is pleased when one is active and shows predominant consideration
and willingness to community service,325 as they believe that God is present in all individuals.
Therefore, Sikhism believes that “[a]ll behaviour, including that in business is guided by three
principles – cultivating virtues, honest labour and service to humanity.”326 It therefore seeks the well-
being of all people and expresses a people-centred evaluative model and management ethics.
In Islam, work is regarded as a virtue that balances the needs of both the individual and society and
promotes the independent and social nature of human beings by being a source of self-respect and
including bodily or material happiness. To obtain happiness in this level, however, morality must be employed
as the guideline in order to prevent exploitation both to one’s own self and others.” Numkanison Subhavadee,
“Business and Buddhist Ethics,” The Chulalongkorn Journal of Buddhist Studies 1, no. 1 (2002): 40. 317 Shrestha, “Religious Ethics and Socially Responsible Behaviours of Small Firms in Nepal.” 6. 318 Shrestha, “Religious Ethics and Socially Responsible Behaviours of Small Firms in Nepal.” 8. Cf.
Subhavadee, “Business and Buddhist Ethics,” 39-58. 319 Essen, “Sufficiency Economy and Santi Asoke,” 71, 94. 320 Mruthyunjaya, Business Ethics and Value Systems, 377. 321 Mruthyunjaya, Business Ethics and Value Systems, 377. 322 A.S. Chawla, Dharminder Singh and Jasleen Kaur, “Management Perspectives of Sikh Religion,”
http://www.globalsikhstudies.net/pdf/2013riv/chawla1.pdf [accessed February 28, 2018]. 323 Mruthyunjaya, Business Ethics and Value Systems, 377. 324 Mruthyunjaya, Business Ethics and Value Systems, 378. 325 Mruthyunjaya, Business Ethics and Value Systems, 378. 326 Charan Singh, “Ethics and Business: Evidence from Sikh Religion,” Working Paper No. 439, Indian
Institute of Management Bangalore, 2013, 4.
An Ethical Rethinking of Workplace Surveillance
271
social welfare.327 Islam teaches about “justice and honesty in trade, courtesy and fairness in
employment relationships, and also encourage humans to learn new skills and to strive to do good
work that benefits both the individual and the community.”328 Therefore, work, in Islam, is not an
end in itself, but a means fostering personal growth and social relations. The intention of the act is
emphasized, not the result.329 The economic activities of an individual are viewed as an obligation.
One is forbade everything that compromises one’s righteousness, and urged to practice honesty and
trustworthiness.330 Moreover, justice, trust and benevolence are three ethical criteria that Islam
promotes that are especially related to workplace behaviours: justice leads to a balanced behaviour,
meaning that one avoids extremes and acts in a proportionate manner; trust enables the individual to
bear responsibility for his or her actions, leading to benevolence, and excellence.331 Thus, Islam
speaks about two conditions that ensure quality in the workplace. Firstly, employers’ obligation to
to provide employees with all the necessary facilities for a good work climate, taking into account
all humanistic factors. Secondly the obligation of employees to employers to pursue the goals of the
organization by working in an honest and timely way and by being trustworthy, committed and
productive to give the best to the organization.332 Hence, Islam gives importance to the duty that each
person should responsibly fulfil in a given situation.
Islam thus provides a wide-ranging ‘code of life,’ with attention to its physical, social, intellectual
and spiritual aspects.333 The topic of the Holy Quran, as Razimi et al. states, is the “Human Being,”
and it covers all aspects of human day-to-day life, including the welfare of employees, organizations
and entire societies.334 Although Islam identifies with Christianity and Judaism in various conceptual
respects, it provides also certain unique perspectives, such as by “considering work as worship and
perfection of work as a religious duty, making welfare of society contingent on business and
327 Othman, “Work Ethics and Quality Workplace,” 82. Cf. Abbas J. Ali and Abdullah Owaihan, “Islamic
Work Ethic: A Critical Review,” Cross Cultural Management: An International Journal 15, no. 1 (2008): 5-
19. 328 Othman, “Work Ethics and Quality Workplace,” 83. Cf. Mohamed Branine and David Pollard, “Human
Resource Management with Islamic Management Principles: A Dialectic for a Reverse Diffusion in
Management,” Personnel Review 39, no. 6(2010): 712-727. 329 Othman, “Work Ethics and Quality Workplace,” 83. 330 Abbas J. Ali. “Scaling an Islamic Work Ethic.” The Journal of Social Psychology 128, no. 5 (1988): 575-
583. 331 Othman, “Work Ethics and Quality Workplace,” 87. Johan Graafland et al. state that “the core values in
business life are freedom and justice,” in which “freedom is connected to justice,” which “includes the
fulfilment of promises, pacts and contracts.” Johan Graafland, Corie Mazereeuw and Aziza Yahia, “Islam
and Socially Responsible Business Conduct: An Empirical Study of Dutch Entrepreneurs,” Business Ethics:
A European Review 15, no. 4 (2006): 391. 332 Othman, “Work Ethics and Quality Workplace,” 93. The impacts of religion on employees in individual
level include “creativity, honesty and trust, personal fulfilment, commitment, motivation and job satisfaction,
and organizational commitment,” while “emotional development and spiritual competence, encouraged
holistic ways of working, developed community at work, empowered workforce and human society, risk
aversion and ethics, stress management and career development” characterise the organizational level. Rafiki
and Wahab. “Islamic Values and Principles in the Organization,” 1. Cf. Scott J. Vitell, “The Role of
Religiosity in Business and Consumer Ethics: A Review of the Literature,” Journal of Business Ethics 90,
no. 2 (2009): 155-167; Val M. Kinjerski and Berna J. Skrypnek, “Creating Organisational Conditions that
Foster Employee Spirit at Work,” Leadership and Organisation Development Journal 27, no. 4 (2006): 280-
295. 333 Muhammad Habib Rana and Muhammad Shaukat Malik, “Human Resource Management from an Islamic
Perspective: A Contemporary Literature Review,” International Journal of Islamic and Middle Eastern
Finance and Management 9, no. 1 (2016): 109-124. 334 Mohd Shahril Bin Ahmad Razimi, Murshidi Mohd Noor and Norzaidi Mohd Daud, “The Concept of
Dimension in Human Resource Management from Islamic Management Perspective,” Middle-East Journal
of Scientific Research 20, no. 9 (2014): 1175-1182.
An Ethical Rethinking of Workplace Surveillance
272
balancing work and life.”335 Though the concept human dignity is not well defined in Islam, modern
interpreters have established a foundation for it. For instance, the Universal Islamic Declaration of
Human Rights, in its foreword, states that “Islam gave to mankind an ideal code of human rights
fourteen centuries ago. These rights aim at conferring honour and dignity on mankind and eliminating
exploitation, oppression and injustice.”336 Thus, the dignity of the human being is the cornerstone for
all laws in Islam. For it teaches that “all men are equal in terms of basic human dignity”337 and tries
to enhance such dignity and thus human integrity. This can be explained as an Islamic Humanism,
one that “will see human dignity and human rights as situated within, not apart from, [a] larger
created whole, itself evolving through time, with each creature having […] intrinsic value.”338 The
essence of humanism in Islam, according to Farhan Shah, emphasizes “(1) the innate dignity of
humanity, (2), the universality of human rights, and (3) the inter-relationality of all creation.”339 It
asserts that humans are created worthy of dignity and honour and maintains that every individual is
the subject of his or her own life and is an end in itself; a someone, not a something.
Jewish tradition, in the same way, calls for people to practice compassion and urges them to “prevent
the suppression of human potential.”340 Judaism provides ethical guidelines to manage people with
integrity, justice and fairness, as well as with honesty and loving kindness. Against the instinct to
maximise profit, it helps enable people to act justly and deals with employer-employee relationships,
“treating workers, forming partnerships, making agreements, […] ensuring integrity in
interactions.”341 Acknowledging the “rights and obligations inherent in being human,”342 any kind of
oppression is considered unethical and fair labour standards are sought to ensure others’ welfare.
Judaism holds that “since our lives and futures are interdependent, sharing with those less fortunate
is essential to the common good and protects the dignity of each person.”343 It supports the rights of
individual employees’ “to organize and bargain collectively” and insists that one must often go
beyond the letter of the law to its spirit. It calls for all people to value solidarity.344 Jewish morality
also advocates altruistic behaviours or great value to an organization. In all these religious traditions
and teachings, we find a robust and active effort to ensure repsct for the dignity of human person and
a vital humanistic morality that promotes both self-respect and genuine concern for others.
335 Rana and Malik, “Human Resource Management from an Islamic Perspective,” 112. 336 Islamic Council, “Universal Islamic Declaration of Human Rights,” September 19, 1981.
http://www.alhewar.com/ISLAMDECL.html [accessed April 20, 2018]; Salem Azzam Secretary General,
“Universal Islamic Declaration of Human Rights,” Human Rights 2, no. 3 (2007):102-112. 337 Organization of Islamic Conference, “Cairo Declaration on Human Rights in Islam,” August 5, 1990.
http://www.bahaistudies.net/neurelitism/library/Cairo_Declaration_on_Human_Rights_in_Islam.pdf
[accessed April 20, 2018]. Cf. Domènec Melé, “Three Keys Concepts of Catholic Humanism for Economic
Activity: Human Dignity, Human Rights and Integral Human Development,” in Humanism in Economics and
Business: Perspectives of the Catholic Social Tradition, eds. Domènec Melé and Martin Schlag (Dordrecht:
Springer, 2015), 113-136. 338 Farhan Shah, “Islam, Humanism and Ecology,” Vart Land, October 14, 2016.
http://www.verdidebatt.no/innlegg/11663959-islam-humanism-and-ecology [accessed April 20, 2018]. 339 Shah, “Islam, Humanism and Ecology.” 340 Susan S. Case and J. Goosby Smith, “Contemporary Application of Traditional Wisdom: Using the Torah,
Bible, and Qur’an in Ethics Education,” in Handbook of Research on Teaching Ethics in Business and
Management Education, eds. Charles Wankel and Agata Stachowicz-Stanusch, 39-64 (Hershey, PA:
Information Science Reference, 2012), 42. 341 Case and Smith, “Contemporary Application of Traditional Wisdom,” 42. 342 Case and Smith, “Contemporary Application of Traditional Wisdom,” 42. 343 Case and Smith, “Contemporary Application of Traditional Wisdom,” 42. Cf. Elliot N. Dorff and Louis E.
Newman, Jewish Choices, Jewish Voices: Body (Philadelphia: Jewish Publication Society, 2008), 32-39. 344 Case and Smith, “Contemporary Application of Traditional Wisdom,” 45.
An Ethical Rethinking of Workplace Surveillance
273
6.3.3 Catholic Social Thought and the Call for a New Managerial Ethics
Christian ethics and spirituality have a long tradition of being applied to economics and business
contexts. Its distinctive combination of faith and reason offers “principles, criteria, and guidelines
for action and a set of virtues with relevance for economic activity.”345 Its unique horizon of
interpretation and inspired “interplay between the rational and the narrative aspect of Christian
practice and thinking,”346 make possible another interpretation of business practices. As Verstraeten
elucidates,
Because Christians cultivate a hermeneutic relationship to an interpreting community and an ethos
that is different than that of modernity and its forms of instrumental and managerial rationality,
they able to discover ethical and meta-ethical perspectives that can break through the dominance
of this type of rationality and social organization which is coupled with it, as well as it enables
them to break through the narrow angle of problem solving.347
In this regard, from the perspective of narrative ethics (e.g., a biblical narrative perspective),
Verstraeten calls upon business people to interpret their practices in a new light, encouraging them
to act in a morally responsible way.348 Decisions and acts must be considered from all perspectives
in a person’s life as a whole, because “[m]orality is not only a question of particular decisions and
separate acts, but also and in the first place a continuing actualization of a fundamental ethical life
intention which finds its significance in a […] religious fundamental option.”349 So, any professional
decision that contradicts a person’s fundamental ethical life choice creates a problematic tension. A
human person is constituted as a moral subject, and his or her professional moral decisions are
influenced by this such that one cannot separate personal responsibility and from the moral
responsibilities associated with their role. The movement from limited types of individual ‘role
responsibility’ to a more ‘universal responsibility,’ according to this narrative model, is relevant to
professional ethics. For instance, the functional difference between role obligation and global
responsibility makes clear the ‘neighbourhood-effects’ and effects a shift from a technocratic
mentality to a deeper kind of human concern. This is reflected in the long-term effects of professional
decisions as well.350 We explain this further in the following analysis of Catholic Social Thought
(CST),351 which presents itself as an example par excellence in this regard, and as helpful in
345 Domènec Melé and Joan Fontrodona, “Christian Ethics and Spirituality in Leading Business Organizations:
Editorial Introduction,” Journal of Business Ethics 145, no. 4 (2017): 671. 346 Verstraeten, “How Faith Makes a Difference,” 58. For the explanation, within the scope of this research,
we limit the analysis only with the exploration of Christian theological reflections. 347 Verstraeten, “How Faith Makes a Difference,” 58. Though he acknowledges the domination of capitalistic
ethos in business having religious roots (for instance, the perceived link between Christian ethics and the
emergence of the capitalist work ethic [Protestantism and the Spirit of Capitalism - Max Weber]), Verstraeten
illustrates that it is not the calling of Christians to justify the market. 348 Verstraeten, “How Faith Makes a Difference,” 62-66. 349 Verstraeten, “How Faith Makes a Difference,” 63. 350 Verstraeten, “How Faith Makes a Difference,” 64. 351 CST is widely known today, with its continuing conversation with the human sciences, as an excellent
contributor of the ethical analysis of human concerns and life matters going beyond any particular faith
convictions and theology. Cf., Johan Verstraeten, “Catholic Social Thought and Amartya Sen on Justice,” in
Economics as Moral Science, eds. Peter Rona and Laszlo Zsolnai, Virtues and Economics, Vol. 1, 215-223
(Switzerland: Springer, 2017), 215. Through CST’s global perspectives in analysing things, it tries to create
responsible global citizens and a more just world to live in. So, its purpose, according to Pope Benedict XVI,
“is simply to help purify reason and to contribute, here and now, to the acknowledgment and attainment of
what is just.” Cf., Pope Benedict XVI, Deus Caritas Est, 28. Confer, for instance,
http://w2.vatican.va/content/benedict-xvi/en/encyclicals/documents/hf_ben-xvi_enc_20051225_deus-
caritas-est.html [accessed November 1, 2017]. Catholic Social Teachings are important for this research as it
particularly deals with the rights of workers and the dignity of work. Matters of human dignity and common
good in society are aimed at its discussion in various socio-economic issues of our time.
An Ethical Rethinking of Workplace Surveillance
274
understanding the role religion can play in ethical analysis, as it also fosters ethical reasoning about
socio-political and economic issues.
Catholic Social Thought (CST) has consistently criticised modern social and political ideologies that
fail to respect for human dignity and promote the common good. CST is said to emerge from the
Church’s own encounter of Gospel teachings with current social problems, stimulating a “greater
insight into the authentic requirements of justice as well as greater readiness to act accordingly.”352
According to Alejo José G. Sison et al., CST “represents a body of moral reflection forged through
centuries on social issues; it seeks rational and faith-harmonious solutions in accordance with the
characteristics of human nature within changing historical contexts.”353 CST tries to reconstruct the
social order by responding to social challenges such as inhumane conditions in various social
institutions. In the modern period, Church’s social teaching dates from the 1891 encyclical of Pope
Leo XIII on the condition of labour (Rerum Novarum), responding to the plight of working-class
people in industrial societies. Pope Leo focuses on the just and equitable interrelationship of workers
and their specific rights and duties in various social situations.
Along with its significant concepts – including respect for human dignity, human rights, stewardship,
the Golden Rule (treating others as you would have them treat you), and the idea of service in leading
others – one finds in CST a vision of “integral human development and emphasis on the common
good as a criterion of the moral legitimacy of the social order.”354 Referring to several encyclicals
and other documents of the Catholic Church, Domènec Melé and Joan Fontrodona describe several
concepts relevant to business and employee management, such as the “personalist view of work” and
labour rights, “business as a community,” “the common good as criterion for legitimization of
business,” the centrality of “integral human development” beyond economic development, and
“business as a noble vocation.”355 These concepts will be further explored in the final chapter.
Verstraeten, combining Catholic Social Thought with the idea of justice proposed by Amartya Sen,
contends that the starting point for ethical exploration in relation to business practices must be
indignation about injustice and a consequent recognition of one’s moral duty to seek a just
alternative.356 He later asserts, however, that “moral indignation is a necessary but not sufficient
352 Benedict XVI, “Deus Caritas Est,” Encyclical on Christian Love, December 25, 2005,
http://w2.vatican.va/content/benedict-xvi/en/encyclicals/documents/hf_ben-xvi_enc_20051225_deus-
caritas-est.html [accessed February 20, 2018]; Alejo José G. Sison, Ignacio Ferrero and Gregorio Guitián,
“Human Dignity and the Dignity of Work: Insights from Catholic Social Teaching,” Business Ethics
Quarterly 26, no. 4 (2016): 503. 353 Sison, Ferrero and Guitián, “Human Dignity and the Dignity of Work,” 505. 354 Melé and Fontrodona, “Christian Ethics and Spirituality in Leading Business Organizations,” 674. Cf. John
XXIII, “Mater et Magistra,” Encyclical on Christianity and Social Progress, May 15, 1961.
http://w2.vatican.va/content/john-xxiii/en/encyclicals/documents/hf_j-xxiii_enc_15051961_mater.html
[accessed February 15, 2018]; Benedict XVI, “Caritas in Veritate,” Encyclical on Integral Human
Development in Charity and Truth, June 29, 2009. http://w2.vatican.va/content/benedict-
xvi/en/encyclicals/documents/hf_ben-xvi_enc_20090629_caritas-in-veritate.html [accessed February 15,
2018]. 355 Melé and Fontrodona, “Christian Ethics and Spirituality in Leading Business Organizations,” 674. Along
with previously referred encyclicals, see further: Leo XIII, “Rerum Novarum,” Encyclical on the Labour and
Social Order, May 15, 1891, http://w2.vatican.va/content/leo-xiii/en/encyclicals/documents/hf_l-
xiii_enc_15051891_rerum-novarum.html [accessed February 15, 2018]. John Paul II, “Centesimus Annus,”
Encyclical on Socio-Economic Order, May 1, 1991, http://w2.vatican.va/content/john-paul-
ii/en/encyclicals/documents/hf_jp-ii_enc_01051991_centesimus-annus.html [accessed February15, 2018];
Paul VI, Populorum Progressio,” Encyclical on Development of People, March 26, 1967,
http://w2.vatican.va/content/paul-vi/en/encyclicals/documents/hf_p-vi_enc_26031967_populorum.html
[accessed February 15, 2018]. 356 Verstraeten, “Catholic Social Thought and Amartya Sen on Justice,” 217.
An Ethical Rethinking of Workplace Surveillance
275
condition and that it need to be followed by moral reasoning.”357 This reasoning, however, does not
exclude the wisdom of religion, as human persons are capable of being reasonable358 even by inviting
and reflecting on ideas from different sources. Therefore, professional ethics requires attention to
three components of ethics: the personal, social and religious/faith-based. For ethics, being based on
accepted standards of behaviour, is developed through one’s individual philosophy, through the
influence of one’s community, and often in dialogue with religious writings, interpretations and
practices.
This ethical approach to workplace behaviour, directed through human rights and social justice,
further makes it possible to hold organizations to account for human rights violations and social
justice violations, even when they have acted in accordance with the law. Rethinking how to manage
workplace behaviours, beyond the constraints of “standard” agency theory, Martijn Cremers argues
that CST offers an alternative due to its focus on human dignity, solidarity, and subsidiarity.359
Cremers calls these the three pillars of CST, and especially emphasizes the first pillar, human dignity
– “the value and grandeur of the human person” (CA 41) – that each member of an organization
recognizes in him or herself and in others.360 Cremers regards organizations as communities of human
persons seeking to contribute to and foster human flourishing by treating each one not instrumentally
but as end in him or herself. This in fact leads members of organizations to enter into a relationship
of solidarity and communion with one another. Hence, referring to the Compendium of the Social
Doctrine of the Church (CSDC), Melé observes that the principle of human dignity is “based on the
recognition of and respect for the intrinsic worth of every human being, the awareness of the primacy
of each human being over society, and the corresponding duty of respect for every person, which
includes not manipulating him or her for ends which are foreign to his or her own development.”361
This unique consideration of human beings and their values remains the foundation of all the
principles of Catholic social teaching.
This second pillar – solidarity – “emphasizes the social nature of the human person, linking our right
to have our dignity respected by others to our duty to respect the dignity of others, which requires us
to consider our social responsibility.”362 This principle acknowledges “the existence of
interdependences and social interactions, with the corresponding sense of unity, recognition of the
intrinsic worth of each party, and a sense of brotherhood – all of which require awareness of and
willingness for the common good.”363 It demands a recognition of one’s obligation to contribute to
357 Verstraeten, “Catholic Social Thought and Amartya Sen on Justice,” 217. 358 Sen, The idea of Justice, 43; Verstraeten, “Catholic Social Thought and Amartya Sen on Justice,” 218. 359 Martijn Cremers, “What Corporate Governance Can Learn from Catholic Social Teaching,” Journal of
Business Ethics 145, no. 4 (2017): 711-724. Though agency theory is the standard paradigm in some of the
academic corporate governance research, Cremers views it as reductionist and is problematic due to both
economic limitations (asymmetric information, contract completeness, and the need for coordination through
explicit power or hierarchies) and human limitations (bounded rationality, opportunism, and behaviourism). 360 John Paul II, “Centesimus Annus,” no. 41. Cremers, “What Corporate Governance Can Learn from Catholic
Social Teaching,” 712. 361 Domènec Melé, “Virtues, Values, and Principles in Catholic Social Teaching,” in Handbook of Virtue Ethics
in Business and Management, eds. Alejo José G. Sison, Gregory R. Beabout and Ignacio Ferrero, 153-164
(Dordecht: Springer, 2017), 158. Cf. Pontifical Council for Justice and Peace, Compendium of the Social
Doctrine of the Church (London: Continuum International, (originally, 2004) 2012), no. 132-133. 362 Cremers, “What Corporate Governance Can Learn from Catholic Social Teaching,” 712. Referring to Sison
and Fontrodona and the Christian anthropological perspectives, Cremers specifies that “one’s ‘self-interest’
is linked with and depends on others’ ‘self-interest,’ or within organizations with the organization’s shared
interest.” Cremers, “What Corporate Governance Can Learn from Catholic Social Teaching,” 712. Cf. Alejo
José G. Sison and Joan Fontrodona, “The Common Good of the Firm in the Aristotelian-Thomistic Tradition,”
Business Ethics Quarterly 22, no. 2 (2012): 211-246. 363 Melé, “Virtues, Values, and Principles in Catholic Social Teaching,” 159.
An Ethical Rethinking of Workplace Surveillance
276
the common good of society, and is closely connected with the previously discussed principle of
human dignity. This obligation qualifies the “duty to contribute to sustainability” of all members,
which is “inherent in all human relationships” (CSDC 193).364 The third pillar of CST – subsidiarity
– provides employees the “opportunity and freedom to participate, serve others, and receive help to
develop toward their full potential.”365 In organizations, it supports the personal development of
employees through participation and shared values in solidarity. This further leads to the principle of
participation, which enables one to be part of ruling process in which each has a right and a duty to
a certain role according to the position one possesses.
According to Cremers, these pillars affect the three functions of employee management – the
compass function, the commitment function, and the criteria function.366 The compass function
provides for human flourishing in the organization through a set of proper values one can use to
guide oneself; the commitment function coordinates the cooperation of all members in solidarity; the
criteria function looks for what constitutes excellence in organizational performance.367 Within the
compass function, Pope John Paul II’s encyclical Centesimus Annus, referring to Rerum Novarum,
presents a holistic view of human life and asks organizations not to contribute to a merely
materialistic view of human life but rather to foster integral human development.368 The commitment
function of employee management leads “corporate resources (including corporate positions of
power and privileges) toward solidarity, allowing everyone in the corporation to cooperate in
mutually beneficial relationships toward a shared goal.”369 In the same way, analysing the criteria
function, Cremers identifies the virtue of justice as a constitutive factor for excellence in human
flourishing, as there is a significant danger of asymmetric information (abuse of superior
information), unequal power and differences in control and organizational management.370
Moreover, distributive justice in solidarity is a prime requisite,371 according to Cremers, for internal
corporate governance or employee management in the organization. The dignity of human persons
and the supremacy of the common good do much to ensure the appeal of CST and ensure its
application in particular contexts and circumstances. CST therefore criticizes unsustainable
managerial models based on a narrowly modern economic and technocratic paradigm.
Another feature of CST is its understanding of and contribution to the notion of the subjectivity of
the work (Laborem Exercens, no.6). The objective dimension of work is the “sum of activities
resources, instruments and technologies used by men and women to produce things,” while its
subjective dimension is “the activity of the human person as a dynamic being capable of performing
a variety of actions that are part of the work process and that correspond to his personal vocation”
(CSDC 270).372 This means that, as Sison et al. illustrate, the objective dimension embodies the
“contingent aspect” of work, with its technological, cultural, social and political conditions, whereas
the subjective dimension represents the “stable aspect” and is based exclusively on the dignity of
364 Melé, “Virtues, Values, and Principles in Catholic Social Teaching,” 159. 365 Cremers, “What Corporate Governance Can Learn from Catholic Social Teaching,” 712. Cf. Gregorio
Guitián, “Service as a Bridge between Ethical Principles and Business Practice: A Catholic Social Teaching
Perspective,” Journal of Business Ethics 128, no. 1 (2015): 59-72. 366 Cremers, “What Corporate Governance Can Learn from Catholic Social Teaching,” 719. 367 Cremers, “What Corporate Governance Can Learn from Catholic Social Teaching,” 719-723. 368 Cremers, “What Corporate Governance Can Learn from Catholic Social Teaching,” 720. Cf. John Paul II,
“Centesimus Annus,” nos. 35 & 36. 369 Cremers, “What Corporate Governance Can Learn from Catholic Social Teaching,” 721. Cf. Michael E.
Porter and Mark R. Kramer, “Creating Shared Value: How to Reinvent Capitalism - and Unleash a Wave of
Innovation and Growth,” Harvard Business Review 89, nos. 1-2 (2011): 1-17. 370 Cremers, “What Corporate Governance Can Learn from Catholic Social Teaching,” 722. 371 Cremers, “What Corporate Governance Can Learn from Catholic Social Teaching,” 722. 372 Compendium of the Social Doctrine of the Church, no. 270,
An Ethical Rethinking of Workplace Surveillance
277
human beings.373 In the same way, work is the essential expression of the person and denotes that
“any form of materialism or economic tenet that tries to reduce the worker to being a mere instrument
of production, a simple labour force with an exclusively material value, would end up hopelessly
distorting the essence of work and stripping it of its most noble and basic human finality” (CSDC
271).374 Hence, according to CSDC, human work “proceeds from the person” and is “ordered to and
has its final goal in the human person.”375 So, the purpose or end of work is man himself and its
subjective dimension is of superior importance, in line with the notion of human dignity. The idea of
work as an act of the person again makes clear the primacy of the notion of the ‘personalist principle’
in workers’ management. This will be further explored in the final chapter.
In this regard, in Economic Justice for All, a Pastoral Letter on Catholic Social Teaching and the U.S.
Economy, the Catholic Bishops of United States link the concepts of social justice, the common good
and participation to the discussion on work and workers.376 Discussion on these concepts contribute
to the merit of the pillars of CST discussed above. It acknowledges basic justice in three dimensions:
commutative, distributive and social (no.68). Commutative justice respects the equal human dignity
of all individuals and “calls for fundamental fairness in all agreements and exchanges between
individuals” (no.69). Distributive justice, in the same way, looks for the equal allocation of income,
wealth, and power (no.70). According to this document, “social justice implies that persons have an
obligation to be active and productive participants in the life of society and that society has a duty to
enable them to participate in this way” (no.71). It demands that every individual contribute to the
common good. For productivity in an organization is not only based on outcomes in terms of goods
and services, but is also “measured in light of their impact on the fulfilment of basic needs,
employment levels, patterns of discrimination, environmental quality, and sense of community”
(no.71). It has to be done in a way that ensures respect for the freedom and dignity of every individual.
Work should enable the working person to become “more a human being,” more capable of acting
intelligently, freely, and in ways that lead to self-realization (no.72).
This document states that human dignity is realized in solidarity with others and affirms the link
between the respect for human rights and a sense of responsibility, both at the level of the individual
and that of the community. These conditions lead to the concept of the common good and fulfilment
of material needs in freedom. This in turn aims to protect relationships and enable the participation
of all in the life of society. For the common good, according to this document, “demands justice for
all, the protection of the human rights of all” (no.85). Basic justice with its multidimensional
variables, demands that all members of society be afforded at least a minimum level of participation
in the economy. Unfair exclusion, that prevents any individual from participating in or contributing
to the economy, is wrong (no.15). For what lies at the heart of true justice is a drive for solidarity and
participation. A “minimum level of participation in the life of the human community for all persons”
(no.77) is required, as it re-establishes the individual, organizational (professional) and social well-
being of all concerned. Hence, “Catholic social teaching does not maintain that a flat, arithmetical
equality of income and wealth is a demand of justice, but it does challenge economic arrangements
that leave large numbers of people impoverished. Further, it sees extreme inequality as a threat to the
solidarity of the human community, for great disparities lead to deep social divisions and conflict”
373 Sison, Ferrero and Guitián. “Human Dignity and the Dignity of Work,” 515. 374 Compendium of the Social Doctrine of the Church, no. 271. 375 Compendium of the Social Doctrine of the Church, no. 272. 376 United States Catholic Bishops, “Economic Justice for All: Pastoral Letter on Catholic Social Teaching and
the U.S. Economy,” 1986. http://www.usccb.org/upload/economic_justice_for_all.pdf [accessed April 25,
2018].
An Ethical Rethinking of Workplace Surveillance
278
(no.74). This is an expression of the communitarian vocation of every human being. This social
justice discourse will be further explored in the next chapter.
To sum up this section, we may quote Peter Ferdinand Drucker, who argues that “society needs a
return to spiritual values – not to offset the material but to make it fully productive. However remote
is its realization for the great mass of mankind, there is today the promise of material abundance or
at least of material sufficiency. [We need a] return to spiritual values […] the deepest experience that
the Thou and the I are one, which all higher religions share.”377 Reconnecting to religion can help to
promote values of compassion and empathy in corporate and organizational relationships and
religion can be a constituent component of human anthropology that looks for a distinctive personal
experience for all members in an organization based on endemic human qualities and values. It
recognizes the “whole” person in the workplace. The organizational model of the whole person in
the workplace empowers employees to put their maximum into the organization. In terms of their
spiritual dimension, it allows them to work with a higher loyalty and responsibility, more creativity
and less absenteeism and turnover.378 Employees do not wish to segregate their life from their work
or vice versa and demand a holistic life, in which they can immerse their whole life, including their
faith. In the same way, the recognition and integration of faith with work enables it to encompass
ethics, diversity, human rights, and the various interests of both employers and employee alike, all
of which, taken together, benefit both individual (personal) and organizational (corporate) integrity,
development and well-being.
6.3.4 Christian Personalism and Meaningful Employment Practices
Johan De Tavernier, referring to Emmanuel Mounier’s account of personalism and in line with Kant,
state the need to defend the primacy of the person and articulate that no other person or any collective
whole can legitimately utilize the person as mere means to an end.379 For, De Tavernier continues,
as a free being that adopts, assimilates, lives and affirms values, every person constitutes his or her
uniqueness and worth.380 Personalism enters here and assures the maximum true culture that one is
capable to possess and exhibit. De Tavernier further brings out Mounier’s blame on the ‘primacy of
economics’ subordinating the freedom of human beings and preferring profit to person.381 However,
De Tavernier states that personalist economics subordinates economics to persons valuing labour,
not capital, as central to the market economy. According to him “the primacy of labour over capital
rests on the fact that human work is the one and only agent that is productive in economic activity.
[…] While work should not be made the exclusive definition of human beings, it must be recognized
as an essential human activity that partly completes the person.”382 De Tavernier refers also to
Jacques Maritain and argues for a “distinct and developing understanding of the human being and
377 Peter F. Drucker, Landmark of Tomorrow: A Report on the New “Post Modern” World (New Brunswick:
Transaction Publishers, 2011), 264-265. Peter Ferdinand Drucker, Peter Drucker on the Profession of
Management (Harvard: Harvard Business School, 2003); and David E. McClean, Wall Street, Reforming the
Unreformable: An Ethical Perspective (Oxon: Routledge, 2016), 32. 378 David Miller and Timothy Ewest, “Rethinking the Impact of Religion on Business Values: Understanding
its Reemergence and Measuring its Manifestations,” in Dimensions of Teaching Business Ethics in Asia, eds.
Stephan Rothlin and Parissa Haghirian (Berlin: Springer, 2013), 29-38. 379 Johan De Tavernier, “The Historical Roots of Personalism: From Renouvier’s Le Personnalisme, Mounier’s
Manifeste au service du personnalisme and Maritan’s Humanisme integral to Janssens’ Personne et Societe,”
Ethical Perspectives 16, no. 3 (2009): 369. See also: Emmanuel Mounier, A Personalist Manifesto, trans. by
the Monks of Saint John’s Abbey at Collegeville, Minn (London: Longmans, Green and Company, 1938),
69. 380 De Tavernier, “The Historical Roots of Personalism,” 369. See also: Joseph Amato, Mounier and Maritain:
A French Catholic Understanding of the Modern World (Alabama: University of Alabama Press, 1975), 130. 381 De Tavernier, “The Historical Roots of Personalism,” 370. 382 De Tavernier, “The Historical Roots of Personalism,” 371.
An Ethical Rethinking of Workplace Surveillance
279
the world.”383 According to him, Maritain refutes ‘person-centred humanism (Anthropocentric
humanism - man is his own centre) and opposes collectivism and individualism on the one hand and
values the principle of common good and the spiritual value of the individual person on the other,
and thus envisions a humanistic economics and society.384
In an organizational context, this notion of humanistic economics aspires to serve the employees and
seeks to end the abuses of the capitalist system. These personalistic understanding, in turn, supports
and becomes a reference point for the later Catholic Social Teaching.385 Louis Janssens, the founder
of the Louvain tradition of personalism, perceives human person as the foundation of ethics and the
criterion of ethical discernment.386 He thus argues for an indispensable ‘human condition’
surrounding the workplace to develop integral human riches in the society. This idea requires and
guarantees a person-centred economics over against the profit-centred or work-centred economics.
From a personalistic perspective, this section will describe the notion of meaningful work, the
humanity of workers and the employment relationship, which we have already mentioned in previous
sections.
Along with financial security, human interactions and social relationships, employees need
meaningful employment in order to develop themselves as persons.387 For as John Paul II states at
the very beginning of Laborem Exercens (LE), “only man is capable of work, and only man works,
at the same time by work occupying his existence on earth. Thus, work bears a particular mark of
man and of humanity, the mark of a person operating within a community of persons. And this mark
decides its interior characteristics; in a sense it constitutes its very nature.”388 This shows that work
must be taken seriously and responsibly, and employees must be treated well because of their very
human nature. Work is decisive, according to John Paul II, because it makes life more human (LE
3). He urges that more attention be paid to the one who works (the person) than to his work (his
action), because, for him, the work is in the first place “for the worker” and not the worker “for work”
(LE 6). He continues that, though work itself can have greater or lesser objective value, all work
should be judged by the measure of dignity given to the person who carries it out (LE 6).389 This is
what is required in every employee relationship. As Tablan states, referring to Stephen Overell, that
“what people want from work is to feel useful, fulfilled at least to some degree, to participate in a
collective effort and that work should be performed in an environment that respects fairness and
dignity.”390 In work, it is the human person who must be valued in his or her entirety, and hence here
we have a departure to a personalist understanding of employment practices.
Further, LE 16 recalls that work is a duty because it maintains and develops our humanity. This must
be out of regard for others, especially our families, our society, and all humanity.391 In addition to
this, we also inherit the work of the generations who came before us and share in the building of the
383 De Tavernier, “The Historical Roots of Personalism,” 376. See also: Jacques Maritain, True Humanism
(New York: Charles Scribner’s Sons, 1938), 19-22. 384 De Tavernier, “The Historical Roots of Personalism,” 376. 385 De Tavernier, “The Historical Roots of Personalism,” 377. 386 De Tavernier, “The Historical Roots of Personalism,” 377-384; Alex Liegeois, “Louvain Personalism as
Foundation of Ethics: A Revision in the Care Context,” Louvain Studies 40 (2017): 410. Cf. Louis Janssens,
“Artificial Insemination: Ethical Considerations,” Louvain Studies 8 (1980): 4. 387 Tablan, “Catholic Social Teachings: Toward a Meaningful Work,” 291. 388 John Paul II, “Laborem Exercens,” AAS 73 (1981), http://w2.vatican.va/content/john-paul-
ii/en/encyclicals/documents/hf_jp-ii_enc_14091981_laborem-exercens.html [accessed October 15, 2018]. 389 John Paul II, “Laborem Exercens,” AAS 73 (1981), nos. 3 & 6. 390 Tablan, “Catholic Social Teachings: Toward a Meaningful Work,” 291. Cf. Stephen Overell, The Meaning
of Work (Bristol: Futurelab, 2009). 391 John Paul II, “Laborem Exercens,” AAS 73 (1981), no. 16.
An Ethical Rethinking of Workplace Surveillance
280
future for all who will come after us. This is part of employee rights that comes from work or the
duty to work (LE 16). However, these rights of employees cannot be doomed to be merely the result
of economic systems of profit maximization; rather, the whole economy must be shaped in relation
to the respect for workers’ rights within each country and throughout the world (LE 17).392 In this
line, Tablan affirms the idea of Al Gini, that “access to work that is meaningful and developmental
must be part of the basic package of ethical human rights.”393 Through the apostolic exhortation on
the Eucharist – Sacramentum Caritatis (SC) – Pope Benedict XVI again states that work is
inseparably related to the fulfilment of the human being (respect for human dignity) and the
development of society (the common good).394 According to him, “it is indispensable that people not
allow themselves to be enslaved by work or to idolize it, claiming to find in it the ultimate and
definitive meaning of life” (SC 74).395 In this regard, an illustration concerning work offered by
Tablan can be noted: that “[w]ork is not just the use of mind or muscle in order to achieve a particular
task or obtain our material needs; it shapes human personality and is the most significant factor that
affects the development of our self-identity.”396 Individuals must therefore express their identities in
work and flourish in all their diversity.
Work, according to Tablan, is an objectification of human nature and perfects our human powers and
faculties using reason. Thus, it is “not only an instrumental in humanizing nature, but also in
humanizing man too.”397 Thus, for Tablan, meaningful work is freely chosen and assists employees
in realizing their personal happiness and moral development. At the same time, he argues,
management has to organize workplace in such a way that employees, by the best use of their rational
faculties, may exercise their freedom and independence.398 Pope Benedict XVI has already expressed
this concern in his encyclical Caritas in Veritate – “In Charity and Truth” – where we read:
It [decent work] means work that expresses the essential dignity of every man and woman in the
context of their particular society: work that is freely chosen, effectively associating workers, both
men and women, with the development of their community; work that enables the worker to be
respected and free from any form of discrimination; work that makes it possible for families to
meet their needs and provide schooling for their children, without the children themselves being
forced into labour; work that permits the workers to organize themselves freely, and to make their
voices heard; work that leaves enough room for rediscovering one’s roots at a personal, familial
and spiritual level; work that guarantees those who have retired a decent standard of living (CiV
63).399
The prime duty of the employment relationship, therefore, includes, along with economical practices,
in giving employees opportunities to utilize and develop their faculties and assuring them of a decent
existence. Here work is seen in relation to human fulfilment, such that meaningful work is correlated
to a meaningful life. This authentic growth and fulfilment of the human person (human flourishing)
392 John Paul II, “Laborem Exercens,” AAS 73 (1981), no. 17. 393 Tablan, “Catholic Social Teachings: Toward a Meaningful Work,” 291. Cf. Al Gini, “Meaningful Work and
the Rights of the Worker: A Commentary on Rerum Novarum and Laborem Exercens.” Thought: Fordham
University Quarterly 67, no. 3 (1992): 226-239. 394 Pope Benedict XVI, “Sacramentum Caritatis,” 2007, http://w2.vatican.va/content/benedict-
xvi/en/apost_exhortations/documents/hf_ben-xvi_exh_20070222_sacramentum-caritatis.html [accessed
October 22, 2018]. 395 Benedict XVI, “Sacramentum Caritatis,” (2007), no. 74. 396 Tablan, “Catholic Social Teachings: Toward a Meaningful Work,” 292. 397 Tablan, “Catholic Social Teachings: Toward a Meaningful Work,” 292. 398 Tablan, “Catholic Social Teachings: Toward a Meaningful Work,” 293. 399 Pope Benedict XVI, “Caritas in Veritate,” 2009, no. 63, http://w2.vatican.va/content/benedict-
xvi/en/encyclicals/documents/hf_ben-xvi_enc_20090629_caritas-in-veritate.html [accessed October 25,
2018].
An Ethical Rethinking of Workplace Surveillance
281
and of society (societal development) is the concern of CST. The notion of the subjective dimension
of work has already been explained in previous sections.
In his 2013 apastolic exhortation Evangelii Gaudium – “The Joy of the Gospel” – Pope Francis writes
that, along with ensuring nourishment and a “dignified sustenance” for all people, it is required to
attend to their “general temporal welfare and prosperity.”400 He continues “[t]his means education,
access to health care, and above all employment, for it is through free, creative, participatory and
mutually supportive labour that human beings express and enhance the dignity of their lives. A just
wage enables them to have adequate access to all the other goods which are destined for our common
use” (EG 192).401 In this line, discussing alienation in the workplace, Tablan illustrates two key issues
– a lack of autonomy and alienating wage systems – through which employees come to be unsatisfied
with their work.402 When employees have no control over work processes or the outcome of work,
they feel alienated. While there is no easy solution to these challenges,403 the Catholic vision offers
concrete proposals “that will ensure a just and equitable distribution of profits and active participation
of workers, such as the practice of subsidiarity, uniform and collective bargaining, join ownership of
the means of work, participatory management, share-holding by labour, or other mixed model.”404
Here the participatory model transforms organizations into a community of persons working together
justly for a common goal. The subsidiarity principles, as already discussed, enables all employees,
including lower-level workers, to be treated as co-entrepreneurs.
Alienation also happens in the workplace when employees are treated and valued only in an objective
sense – as mere as instruments of production – leading to a situation where technology dominates
the person and the personalist value of employees is forgotten.405 A lack of concern about employees’
growth through his or her labour is an indication of this instrumentalization of labour within work
process, and John Paul II maintains that this should be prevented.406 Similarly, John Paul II continues
to remind us that the moral excellence of employers and employees is at stake when it is possible for
"“the financial account to be in order, and yet for the people – who make up the firm’s most valuable
asset – to be humiliated and their dignity offended.”407 This also happens when any employment
relationship forgets that man is capable of himself and meaningful work is related to the search for
meaning in life. In this milieu, though CST recognizes the proper role of profit as the first indicator
of business success, it continues to emphasize that “the legitimate pursuit of profit should be in
harmony with the irrenounceable protection of the dignity of the people who work at different levels
in the same company.”408 This enables employees to develop themselves in the process of
employment and thus seeks an authentic integral development of humanity. Let us analyse now what
400 Pope Francis, “Evangelii Gaudium,” 2013, no. 192,
http://w2.vatican.va/content/francesco/en/apost_exhortations/documents/papa-francesco_esortazione-
ap_20131124_evangelii-gaudium.html [accessed October 25, 2018]. 401 Francis, “Evangelii Gaudium,” 2013, no. 192. 402 Tablan, “Catholic Social Teachings: Toward a Meaningful Work,” 298-299. 403 Joanne B. Ciulla, “Worthy Work and Bowie’s Kantian Theory of Meaningful Work,” In Kantian Business
Ethics: Critical Perspectives, eds. Dennis G. Arnold and Jered D. Harris, 115-131 (Northampton: Edward
Edgar, 2012), 115. 404 Tablan, “Catholic Social Teachings: Toward a Meaningful Work,” 299. Cf. John Paul II, “Laborem
Exercens,” AAS 73 (1981), no. 14. 405 John Paul II, “Laborem Exercens,” AAS 73 (1981), no. 8; Tablan, “Catholic Social Teachings: Toward a
Meaningful Work,” 300. 406 John Paul II, “Centesimus Annus,” AAS 83 (1991), no. 41. 407 John Paul II, “Centesimus Annus,” AAS 83 (1991), no. 35. Cf. CSDC, no. 340. 408 CSDC, no. 340. An indiscriminate pursuit of profit maximization of organization is also said to be a form
of alienation in relation to employment practices.
An Ethical Rethinking of Workplace Surveillance
282
the personalistic understanding of CST has to say specifically about employment practices, such as
in job design and implementation.
According to CST, a person-centred approach in business practices is evident when businesspeople
are encouraged to invest in ways that will enable employees to develop their potential as human
beings by making good use of their potentials and abilities.409 The CSDC stresses in this regard that
“allowing workers to develop themselves fosters increased productivity and efficiency in the very
work undertaken.”410 Thus, all economic activities of business and its legitimate pursuit of profit
should also protect the dignity of employees, who are a vital part of the organization itself. Similarly,
as already stated by Pope John XXIII, an active participation of employees in decision-making and
thus to profit and ownership will enable proper relations between managers and employees and
ensure active and loyal cooperation in the common enterprise with good will and appreciation.411 All
these concerns are in line with business or job design. In the same way, in practices of staffing and
recruitment, one must bear in mind that all human beings are of equal fundamental worth, and thus
that unfair discrimination and deception in the organization must be avoided.412 Such practise must
also follow the truthfulness and justice principles and should assess moral dispositions along with
technical skills and efficiency.
The CSDC (no. 186) recalls the need for superior institutions or communities, assuming an attitude
of support and development with respect to lower-order communities.413 This is linked to the training
and development that an organization offers or ought to offer for employees to help ensure their
integral development. Likewise, CST shows a concern for just remuneration of work as a basic step
to regulate and secure a just relationship between the employee and the employer414. In this way,
CST415 encourages employers or management to take into account commutative, distributive, legal
and social justice in their employment practices. It is reasonable also that employers should provide
a decent salary and working conditions to ensure a well-sustained life according to human dignity
for all their employees.416 In this regard, Pope Francis urges humankind in his encyclical Laudato Si’
– “Praise Be” – saying:
We were created with a vocation to work. The goal should not be that technological progress
increasingly replace human work, for this would be detrimental to humanity. Work is a necessity,
part of the meaning of life on this earth, a path to growth, human development and personal
fulfilment. Helping the poor financially must always be a provisional solution in the face of
pressing needs. The broader objective should always be to allow them a dignified life through
work.417
In the same manner, a 2018 document of the Catholic Church, “Oeconomicae et Pecuniariae
Quaestiones” – Considerations for an ethical discernment regarding some aspects of the present
409 John Paul II, “Centesimus Annus,” AAS 83 (1991), no. 36. 410 CSDC, no. 340. 411 John XXIII, “Mater et Magistra,” AAS 53, 1961, no. 92. 412 CSDC, no. 271. Unfair discrimination includes physical/health, familiar-composition, gender, nationality,
cultural, racial, religious, among others. Cf. CSDC, nos. 148, 237, 295, 298, 366, 433, and 536. 413 CSDC, no. 186. 414 John Paul II, “Laborem Exercens,” AAS 73 (1981), no. 19. 415 CSDC, no. 201. 416 Leo XIII, “Rerum Novarum,” 1891, no. 45; John Paul II, “Laborem Exercens,” AAS 73 (1981), no. 14; and
John Paul II, “Centesimus Annus,” AAS 83 (1991), no. 8. 417 Francis, “Laudato Si’,” 2015, no. 128.
http://w2.vatican.va/content/francesco/en/encyclicals/documents/papa-francesco_20150524_enciclica-
laudato-si.html [accessed October 25, 2018].
An Ethical Rethinking of Workplace Surveillance
283
economic-financial system – released by the Congregation for the Doctrine of Faith and the Dicastery
for Promoting Integral Human Development, clearly state that:
[w]ithout an appropriate vision of the human person, it is not possible to create an ethics, nor a
practice, worthy of the dignity of the human person and the good that is truly common. In fact,
however neutral and detached from every basic concept one may claim to be, every human action,
even in the economic sphere, implies some conception of the human person and of the world,
which reveals its value through both the effects and the developments it produces.418
The document continues to remind that “all the endowments and means that the markets employ in
order to strengthen their distributive capacity are morally permissible, provided they do not turn
against the dignity of the person and are not indifferent to the common good.”419 The convictions of
CST regarding the centrality of the human person and the transcendent dignity of all human beings
embark upon the challenging matter of employee management in organization, to be conducted with
humanity and attention to the integral human development of all.
Though CST does not provide any technical solutions for material or earthly realities, its viability
and applicability for employee management in a more human fashion cannot be neutralized or
negated. CST contributes “to the acknowledgement and attainment of what is just,”420 and its guiding
principle is a correct view of human person conferring on him an incomparable dignity.421 This also
implies that “the person is above everything he produces or possesses”422 and that labour (human
capital or social capital) has intrinsic priority over capital (material means of production, financial
resources).423 CST offers employment practices a holistic understanding of the human person in its
embodied, relational, and rational nature. Since labour is the “principal resource” of an
organization,424 the personalist understanding, and value given to work obliges management to
address different issues, such as wage discrimination, unfair treatment, unequal distribution of
profits, employment alienation, etc., and provide workers with the necessary conditions for
meaningful work.
6.4 CONCLUSION
We began in this chapter by arguing for an ethical workplace culture, one that distinguishes right
from wrong and thus legally and morally protects human life in an organization through an
integration of ethics into the normative guidelines used to conduct its business. The notion of
responsible moral behaviours often goes beyond rational choice and thus managerial rationality, and
demands reasonable moral conduct towards the other and within the organization. It also necessitates
418 Dicastery for Promoting Integral Human Development, “‘Oeconomicae et Pecuniariae Quaestiones’ –
Considerations for an Ethical Discernment Regarding Some Aspects of the Present Economic-Financial
System,” Congregation for the Doctrine of the Faith, May 2018, no. 9,
https://press.vatican.va/content/salastampa/en/bollettino/pubblico/2018/05/17/180517a.html [accessed
November 25, 2018]. 419 Dicastery for Promoting Integral Human Development, “Oeconomicae et Pecuniariae Quaestiones,” no. 13. 420 Benedict XVI, “Deus Caritas Est,” 2005, no. 28, http://w2.vatican.va/content/benedict-
xvi/en/encyclicals/documents/hf_ben-xvi_enc_20051225_deus-caritas-est.html [accessed October 25, 2018]. 421 John Paul II, “Centesimus Annus,” AAS 83 (1991), no. 11. Cf. Karen Shields Wright, “The Principles of
Catholic Social Teaching: A Guide for Decision Making from Daily Clinical Encounters to National Policy-
Making,” The Linacre Quarterly 84, no. 1 (2017): 12. 422 Alejo José G. Sison, Ignacio Ferrero and Gregorio Guitián, “Human Dignity and The Dignity of Work:
Insights from Catholic Social Teaching,” Business Ethics Quarterly 26, no. 4 (2016): 520. 423 Sison, Ferrero and Guitián, “Human Dignity and The Dignity of Work,” 520. 424 CSDC, no. 278; John Paul II, “Centesimus Annus,” AAS 83, 1991, no. 32; Sison, Ferrero and Guitián,
“Human Dignity and The Dignity of Work,” 520.
An Ethical Rethinking of Workplace Surveillance
284
the integration of a social, professional and personal ethos in workplace behaviours, and shows how
all judgements are manifestations of that ethos. The role of religion and spirituality in offering an
adequate ethical framework in the workplace was then explored within the contexts of religious
fundamental options and neighbourhood-effects, which effect a shift from a technocratic mentality
to a deep human concern. More than a matter of following accepted cultural and social norms and
laws, integrated ethical behaviour, that an employee ought to live with, is required. The code of ethics
of an organization clarifies the seriousness and significance of the commitment undertaken by the
organization itself to conduct it business ethically. It expresses the obligation of employers to
employees and vice versa and thus recognizes and promotes the individual and social rights of both
parties.
The tripartite ethical discussion in this chapter has presented several arguments related to workplace
surveillance and shows that, as G. Stoney Alder has expressed, “managerial practices which violate
basic rights or cause harm to any of the organization’s stakeholders may be unethical regardless of
the good that practice otherwise creates,”425 and thus call for an ethical response. Both the individual
assessment of rule-based, result-based and virtue-based analyses and the convergence of these prove
that being a virtuous person, respecting rules, examining results can show that external surveillance
is unethical. From a converging employee perspective combining various employee reactions to
monitoring practices and technologies, and from the analysis of individual and social right
perspectives as well as from the converging understanding of the ethical principles, we have found
that the use of ubiquitous surveillance in the organizational workplace is both unethical and unfair.
For the human aspect of employees is often forgotten in the workplace by a purposeful negligence
of the irreducibility of the person and by perceiving big data as a body-subject through the ethics of
rights, power and social justice.
At this juncture, we are not aligned with Graham Sewell and James R. Barker, who in their work,
Neither Good nor Bad, but Dangerous: Surveillance as an Ethical Paradox, argue for a “discursive
ethic of surveillance that accounts for the paradoxes that the phenomenon presents to today’s
organizational members.”426 For, this research of the individual and social effects of surveillance and
monitoring, which is most often detrimental to employees, has shown that these significant negative
effects on employees primarily concern their morale, reducing the efficiency, productivity and
growth of organizations, if such practices are perceived to be unfair or unreasonable. Therefore, apart
from perceiving surveillance as an ethical paradox, this research harmonizes with the view of Lukas
Introna,427 who observes that, though not a resolvable ethical problem, continuous and consistent
electronic surveillance in the organizational workplace is unethical and unfair from an employee
perspective. Accepting this fact is the starting point for the further ethical treatment of workplace
surveillance. This leads to ethically and managerially reconsider surveillance practices due to their
effects firstly on employees, and then on organizations, and finally on society as a whole. It is
particularly significant, as many workplaces today are increasing the deployment of technology
enabling surveillance.
425 Alder, “Ethical Issues in Electronic Performance Monitoring,” 732-733. 426 Graham Sewell and James R. Barker, “Neither Good nor Bad, but Dangerous: Surveillance as an Ethical
Paradox,” Ethics and Information Technology 3 (2001): 183. According to Sewell and Barker, “[s]urveillance
presents us with constant ethical paradoxes. Surveillance is useful but harmful; welcome but offensive; a
necessary evil but an evil necessity. We support surveillance, so long as someone else is in its watchful eye.
We find surveillance as something we have to do - even if it is only to protect ourselves or our organizations
- but we do not particularly care for it.” Sewell and Barker, “Neither Good nor Bad, but Dangerous,” 183. 427 Introna, “Workplace Surveillance ‘is’ Unethical and Unfair.” 210-2016.
An Ethical Rethinking of Workplace Surveillance
285
It is observed in the strict sense from an employee perspective that external surveillance is not
potentially pertinent to increase productivity or workplace efficiency, whereas employee autonomy
and freedom combined with self-control and responsibility benefits any working environment. This
leads to a need to give the employee a significant place, valuing his or her dignity as a human person.
Thus, a new strategic management framework of workplace surveillance, namely “Labourer Valued
Management” (LVM), will be introduced in the next chapter as a means to reconstruct ethical
behavior in the workplace. LVM integrates an interactive partnership model (employer-employee
partnership) with a passionate strategy and a life-centered ethic, shifting the discussion from ‘auto
mode’ or ‘techno mode’ to ‘human mode’ in the debate over workplace surveillance.
CHAPTER SEVEN
LABOURER VALUED MANAGEMENT AND SELF-MONITORING: A PERSON-
CENTERED MANAGERIAL PARADIGM FOR THE WORKPLACE
7.0 INTRODUCTION
The recurring and evocative question haunting many minds in the context of workplace surveillance
is this: why are misconduct and fraudulent activities on the rise in the workplace? Our detailed
analysis in previous chapters, both descriptive and critical, as well as the comparative and associated
reading of the results of the survey conducted for this research, reveal that monitoring systems and
practices effect no substantial change in the misconduct of employees. Identifying employees guilty
of misconduct through implementing ubiquitous surveillance practices and systems and firing them
based on the collected data is not, therefore, a tenable solution to the problem. A circumstantial
prerequisite is an alternative way of thinking about workplace behaviours and employee management
that is likely to lead to a change in the way members of the organization think and act. Therefore, to
stimulate further research, we need a new theoretical perspective and a new management model, with
the capacity to alter both managerial and employee behaviours in the workplace. This alternative
approach must ensure that employees’ voices are heard. In the same way, we have explored
normative theories of ethics in management that focused almost entirely on the acceptability or
permissibility of acts. They judge acts mainly based on their material results (consequentialist ethics)
or based on rules, duties, and obligations (deontological ethics). On this spectrum, we have integrated
the perspective of virtue ethics to enable a distinct perception of moral judgements in which
individuals become the focus rather than acts. Hence, we seek to develop a person-centered account
of moral judgement, which will offer a ‘humanistic’ alternative to the predominant ‘economistic’1
conceptions of employees and workplace behaviours.
The person-centered approach prioritizes the humanness or human character of employees without
neglecting the role played by “principles and norms for good behaviour and for achieving
harmonious and just human relations.”2 It includes “basic and commonly accepted human principles,
such as the Golden Rule (putting oneself in the place of the other) and human values […], human
dignity and human rights.”3 Hence, this final chapter proposes an integrative ethical and personalist
model as a new management paradigm for organizations. After surveying both traditional and
contemporary management models, this chapter provides an overview of a Person-Centered
Approach to employee management. In this, it follows an analysis of Labourer Valued Management
1 Humanistic conceptions are related to that which shows strong concerns for human values, dignity and welfare
where every individual is treated with respect, affirming human freedom and progress. These are ethical
stances emphasizing the individual and collective value and agency of human beings preferring a critical and
analytic thinking. Economic conceptions relate dominance of economic factors, causes and effects over all
other factors in society. Societal factors like culture and nationality are reduced to simplistic economic terms
aiming to mere material standards of living. In a business context, the humanistic perspective serves
individual well-being and the common good, while the economic paradigm focuses on profit maximization.
The humanistic approach includes profits and the development of the organization. However, profit alone
motivation of economistic approach has to be altered to a humanistic understanding of management in which
benefits are valued in terms of well-being of all persons concerned. So, here we look for a fundamental
conceptual shift in workplace management. Hence, we juxtapose the emerging humanistic paradigm with the
traditional economistic paradigm of workplace management. Cf., Michael Pirson, Anuj Gangahar and Fiona
Wilson, “Humanistic and Economistic Approaches to Banking: Better Banking Lessons from the Financial
Crisis,” Business Ethics: A European Review 25, no. 4 (2016): 400-415. 2 Domènec Melé, Business Ethics in Action: Seeking Human Excellence in Organizations (New York: Palgrave
Macmillan, 2009), xvi. 3 Melé, Business Ethics in Action, xvii.
A Person-Centered Managerial Paradigm for the Workplace
288
(LVM) as an integrative ethical alternative in the context of workplace and surveillance ethics.
Finally, it identifies self-monitoring as a human development approach to workplace behaviour able
to complement person-centered, labourer-valued management. An integrated review of a personalist
management paradigm of Domènec Melé will help us embark on the ethical discussion of a
humanistic or person-centered approach to workplace surveillance studies. We begin this discussion
by considering and assessing both historical and contemporary theories of workplace management.
7.1 HISTORICAL AND CONTEMPORARY MANAGEMENT THEORIES AND MODELS
Given the growing ubiquity of monitoring, with its socio-economic, physical, psychological, and
ethical effects on employees and long-term adverse alterations in employee behaviour, we require a
paradigm that protects the right of both individuals and management and avoids any kind of
discrimination and unequal power distances. Therefore, in the following, after introducing the
traditional and contemporary management models, we propose a more viable and significant model
for the workplace. The terms labour or workforce management refer to the practice whereby
“management controls the result by organizing and harmonizing the workforce, keeping the other
aspects of business in parallel, and the objective of the business in centre [...] maintaining a
productive workforce to optimize the productivity.”4 It aims to allocate ‘just the right’ labour talents
and numbers of workers in an organization, to meet all requirements and schedules, to minimize
costs and to maximize productivity-performances and services. It also refers to the effort to
effectively handle the complications and challenges of the workplace and any disputes with the
workforce, keeping in mind the various objectives of the particular organization. Any management
model will revolve around the relationship between situations, actions and outcomes and looks for a
division of labour, effective cooperation, and an increase in the productive powers and skills of
labour. It enables the sustenance of the organization and thus the well-being of all concerned. We
may now illustrate, in a nutshell, a few evolving theories of and approaches to employee
management.
7.1.1 Evolving Theories of and Approaches to Management
Management is defined in general as “the art, or science, of achieving goals through people [...] to
ensure greater productivity or [...] continuous improvement [...] that derives its importance from the
need for strategic planning, co-ordination, directing and controlling of large and complex decision-
making process.”5 According to Andrew J. DuBrin, management is “the process of using
organizational resources to achieve organizational objectives through planning, organizing and
staffing, leading and controlling.”6 Yasin Olum illustrates the threefold objectives of management:
(1) ensuring that organizational goals and targets are met, at the lowest cost and with minimum waste;
(2) looking after the health and welfare and safety of staff; and (3) protecting the machinery and
resources of organization, including human resources.7 Therefore, in the most positive sense of the
word, management is a dynamic and life-giving element that aims to ensure the generation,
sustenance and growth of a business and the well-being of all concerned. Yet the definition of
4 Arun Kumar and Priyadarshani Singh, “Principles and Practices of Workplace Management in Information
Age,” International Journal of Advanced Research in Management and Social Science 3, no. 4 (2014): 23. 5 Yasin Olum, “Modern Management Theories and Practices,” Paper presented at the 15th East African Central
Banking Course, held on 12th July 2004, at Kenya School of Monetary Studies, 2004, 2. According to Olum,
management, in its expanded form, includes “planning, organizing, staffing, leading, and controlling” and
possesses the competence and effectiveness in the areas of “problem solving, administration, human resource
management, and organizational leadership.” Olum, “Modern Management Theories and Practices,” 2. 6 Andrew J DuBrin, Essentials of Management, 9th ed. (Mason, OH: South-Western Cengage Learning, 2012),
2. 7 Olum, “Modern Management Theories and Practices,” 3.
A Person-Centered Managerial Paradigm for the Workplace
289
management does not always endorse this positive meaning. Contemporary models of management
consist of several theories from different schools of thought. Benjamin James Inyang states that
“management theory provides the basis for management practice, and the practice in turn helps to
reinforce the development of management theory. Management practice therefore involves the
translation of existing management knowledge and theories into action that will result in the
achievement of the dual goals of organizational efficiency and effectiveness.”8 Management theories
are broadly classified into different categories that have undergone a rapid revolution in the twentieth
century and are invariably adapted and integrated in different situations in organizational work
scenarios and management processes.
Though the history of management goes back several thousand years, we may here consider its
development starting from the 19th century, around the time that management came to be regarded
as a formal discipline.9 Frederick Winslow Taylor (1856-1915) developed the Scientific Management
Theory –later called Taylorism – that analyses workflows and tries to improve labour productivity
and economic efficiency through the development of a true science, scientific selection, education,
the development of workers, and close cooperation between workers and management.10 Taylor’s
idea that there is ‘one best way’ in management theory reflects his scientific effort to replace ‘rule-
of-thumb’ work methods with an empirically grounded theory.11 Accordingly, the methods of
observation, data gathering, and careful measurement he called for enable each organization to
determine the ‘one best way’ to perform each job. This caused what came to be called a production
“miracle,” as it made it possible to produce finished products much more quickly. However, Taylor’s
theory and its practice was also widely being criticized, being accused of dehumanizing workers.12
Working harder and faster than normal and the undue pressures the places on employees both
exhausts them physically and, in a different sense, exhausts the work to be done, triggering layoffs.
In the same way, the emphasis on productivity and profit led to the unjust exploitation of employees.
Taylor’s approach has also been criticised for placing impersonal efficiency above human needs.
The so-called Classical Organizational Theory arose in reaction to the Scientific Management
Theory of Taylor and others. Founding contributions to this theory include the Administrative
Management Model of Henri Fayol (1841-1925), known as fayolism, and the Bureaucratic Theory
of Max Weber (1864-1920). Henri Fayol prefers management principles to personal traits and defines
management as a continuous process of evaluation.13 In his view, any organization should be
designed with a formalized administrative structure, which often is hierarchical in nature and should
8 Benjamin James Inyang, “The Challenges of Evolving and Developing Management Indigenous Theories
and Practices in Africa,” International Journal of Business and Management 3, no. 12 (2008): 124. 9 Richard M. Hodgetts and Steven Altman, “History of Management Thought,” in Management Handbook:
Operating Guidelines, Techniques and Practices, ed. Paul Mali (New York: John Wiley, 1981), 4-5. 10 Frederick Winslow Taylor, The Principles of Scientific Management (New York: Harper & Brothers
Publishers), 130. See also reprinted version, Frederick Winslow Taylor, The Principles of Scientific
Management (London: Forgotten Books, 2015). Taylorism is largely criticised for dehumanizing the workers
by the process of making him/her like auto-man or machine. Carl Mitcham, ed., “Management,” Encyclopedia
of Science, Technology and Ethics, vol. 3 (Detroit; Thomson & Gale, 2005), 1152-1153. 11 Mitcham, “Management,” 1153. 12 The scientific management theory and its approach seems to work well for organizations disregarding the
human aspects of employees and work with assembly lines and other mechanistic, routinized pattern of
activities. 13 Henry Fayol wrote a monograph in French in 1916 titled “General and Industrial Administration”
(Administration Industrielle et Générale), which was translated later by Constance Storrs. See for instance,
Henri Fayol, General and Industrial Management, trans. Constance Storrs (Eastford, CT: Martino Publishing,
reprint 2013).
A Person-Centered Managerial Paradigm for the Workplace
290
possess a clear division of labour strategies to achieve organizational goals.14 He illustrates a set of
management roles that includes the process of planning, organizing, command, coordination, and
control, and continues by outlining fourteen principles of management that enable both managers
and workers to conduct their affairs more effectively.15 Similarly, Max Weber regards bureaucracy
as an ideal form of organizational structure. In his view, good administration is the exercise of control
through knowledge and shows that rational authority (which is impersonal) is more efficient that
personal authority in organizational management.16 Therefore, along with the hierarchy of authority
and skilled and qualified labour hiring, standardized procedures and well-defined job roles with
meticulous record-keeping are the key features of effective management.17 Weber states that dividing
organizations into hierarchies will establish strong lines of authority and control. This process has
also been criticized, however, for being too focused on administrative requirements, leading to
unpleasant experiences and in the end even inefficient operations. The impersonal machine-like
treatment of employees and harsh dependence on rules and policies make employees feel
dehumanized and distrusted. Consequently, employees avoid taking risks and refrain from pro-
organizational behaviours, leading to indifference and diminished workplace performance.
Discussions about management in the twentieth century raised concerns about the interactions and
motivations of individuals in organizations and gave rise to the Behavioural Theory. This theory
gives due importance to human relations in management. The importance of human interactions in
workplace management was proposed by social scientist Elton Mayo18 (1880-1949), the hierarchical
need-based analysis of management by behavioural psychologist Abraham Maslow (1908-1970),
and the two theory (Theory X and Theory Y) perspective of human behaviour by Douglas McGregor
(1906-1970). All these views acknowledge and illustrate the need to manage human behaviour and
relations in the organization.19 In fact, these theorists introduce the idea of an organizational
humanism. Nell Tabor Hartley, referring to McGregor, explains Theory X as representing the
common assumptions of management that “people work only under conditions of external coercion
14 Michael J. Fells, “Fayol Stands the Test of Time,” Journal of Management History 6, no. 8 (2000): 345-347.
See also Ziarab Mahamood, Muhammad Basharat and Zahid Bashir, “Review of Classical Management
Theories,” International Journal of Social Sciences and Education 2, no. 1 (2012): 512-522. 15 Mitcham, “Management,” 1151; Fells, “Fayol Stands the Test of Time,” 355-357. These principles include
division of work, delegation of authority, discipline, chain of commands, congenial workplace, interrelation
between individual interests and common organizational goals, compensation package, centralization, scalar
chains (hierarchical chain of command), order, equity, job guarantee, initiatives, and team spirit. Fells, “Fayol
Stands the Test of Time,” 355-357. 16 Mücahit Celik and Edip Dogan, “A Theoretical Approach to the Science of Management,” International
Journal of Humanities and Social Science 1, no. 3 (2011): 67; Ziarab Mahamood, Muhammad Basharat and
Zahid Bashir, “Review of Classical Management Theories,” International Journal of Social Sciences and
Education 2, no. 1 (2012): 512-522. See also for further details, Max Weber, The Theory of Social and
Economic Organization, trans. A.M. Henderson and Talcott Parsons (London: Collier Macmillan Publishers,
[originally in 1921] 1947); Max Weber, The Theory of Social and Economic Organization, trans. A.M.
Henderson and Talcott Parsons (New York: The Free Press, 2012), 324-406. 17 Lea Terry, “The Management Theory of Max Weber: Use the Bureaucratic Management Theory to Increase
Efficiency,” 2011, http://www.business.com/management/management-theory-of-max-weber/ [accessed
March 10, 2016]. 18 Elton Mayo is known as the father of the human relations movement. He believed in the interrelationships
among members of an organization and the role of the management to keep that relationship alive to achieve
organization’s goals and objectives. 19 Mitcham, “Management,” 1152. Ryszard Barnat, “Strategic Management: Formulation and
Implementation,” http://www.introduction-to-management.24xls.com/en127 [accessed March 12, 2016].
Reacting to the rather dehumanizing effects of Taylorism, individuals and their unique capabilities have
received major attention in the organization leading to the creation of the idea of human resource
management. Theory X, assuming most employees as basically immature, incapable of taking responsibility,
gives a negative view of employee behaviour and management, while Theory Y acknowledges that employees
seek or self-fulfilment and self-development at work.
A Person-Centered Managerial Paradigm for the Workplace
291
and control” and Theory Y as representing the more positive view that “workers instinctively want
to contribute” (a behaviourist view) to the goals of the organization.20 The five-tiered hierarchy of
needs introduced by Maslow states that a variety of needs motivate individuals. The needs identified
in his schema are arranged in a graded order from lower-level physiological needs to higher-level
needs for self-actualization.21 Physiological needs have to be met first in order to reasonably satisfy
higher-level needs. These theories emphasize basic and functional human needs, individual or group
behaviour, and intra/inter-human relations, and calls for a participatory approach to management.22
It maintains that employees will be ultimately unresponsive to a controlling style of management.
These theories give importance to the social needs of employees, including the need for interpersonal
relationships. However, a question always remains: are employees coming to work to seek affection,
or affiliation? Management, on this theory, must seek to recognize individual needs and social
satisfactions as well as organizational objectives, strive to understand the human aspects of workers,
and treat them accordingly.
7.1.2 Recent Developments in Management Approaches
Recently, a plethora of new management theories and models have emerged, including the systems
approach, contingency theory, team building theory, lean management, etc.23 The systems approach,
being a synthesis and integration of different theories, functions in organizational management by
emphasizing the need for systems to adapt to contextual and circumstantial changes and to
interrelated subsystems.24 This means that, in workplace management, a systems approach “provides
a framework for visualizing internal and external environmental factors as an integrated whole.”25 It
is in this sense an interdisciplinary study of organizational systems, in which a man-made or natural
cohesive interrelation of mutually dependent parts of organizations is expected and experienced.
Another paradigm in recent management trends is the contingency approach, also called situational
theory, that in particular situations, devoid of certain principles, relies on the evaluation of an
experienced manager.26 According to Fred Luthans, “[t]he contingency approach recognizes the
complexity involved in managing modern organizations but uses patterns of relationships and/or
configurations of subsystems in order to facilitate improved practice.”27 Contingency theory aims to
consider all aspects of the current situation and to act in light of those when a decision needs to be
taken. Thus, it argues that “the most effective management concept or technique depends on the set
20 Nell Tabor Hartley, “Management History: An Umbrella Model,” Journal of Management History 12, no. 3
(2006): 281. 21 Wolfgang Pindur, Sandra E. Rogers and Pan Suk Kim, “The History of Management: A Global Perspective,”
Journal of Management History 1, no. 1 (1995): 65. 22 The development and application of behavioural sciences indeed enabled a deep understanding of the needs
and wants of workers and the means by which these could be better aligned with that of organization. 23 Olum, “Modern Management Theories and Practices,”11-21. 24 Olum, “Modern Management Theories and Practices,” 17. According to Cristina Mele et al. “systems theory
is an interdisciplinary theory about every system in nature, in society and in many scientific domains as well
as a framework with which we can investigate phenomena from a holistic approach.” Christina Mele,
Jacqueline Pels and Francesco Polese, “A Brief Review of Systems Theories and Their Managerial
Applications,” Service Science 2, no. 1/2 (2010): 126. In the same way, an “organization is considered as a
system having integrated parts that must be coordinated for efficiency and effectiveness.” Cornell C. Chikere
and Jude Nwoka, “The Systems Theory of Management in Modern Day Organizations: A Study of Aldgate
Congress Resort Limited Port Harcourt,” International Journal of Scientific and Research Publications 5, no.
9 (2015): 1. 25 Richard A. Johnson, Fremont E. Kast and James E. Rosenzweig, “Systems Theory and Management,”
Management Science 10, no.2 (1964): 367. 26 Olum, “Modern Management Theories and Practices,” 18. 27 Fred Luthans, “The Contingency Theory of Management: A Path Out of the Jungle,” Business Horizons 16,
no 3 (1973): 70.
A Person-Centered Managerial Paradigm for the Workplace
292
of circumstances at a particular point in time.”28 The key feature of this approach is the situation at
hand. This theory focuses primarily on the situation here and now. So, according to the contingency
approach, any management process can be said to be situational in nature, as all depend on the
complexity of situations. In this way, this theory takes into consideration the multivariate nature of
organizational workplaces.
In this line, the team building approach relies on teamwork and emphasizes the levelling of
hierarchies or pyramidal management models.29 Team building is defined as “the process of taking
a collection of individuals with different needs, backgrounds, and expertise and transforming them
into an integrated, effective work unit.”30 According to a recent study by Matteo Gaeta and Rocco
Palumbo, team building “consists of an in-depth analysis of the way organizational tasks and
responsibilities are assigned, involving the thorough examination of team processes.”31 This
integration balances individual and organizational needs32 and is said to help merge individual
contributions with the objectives of the organization and support each other’s goals. Lean
management is a recent method of organizational management that identifies and clarifies what
values play a role in workplace processes. It is a management method that adapts to the different
situations of organizational and market conditions through functional alternations.33 It seeks
continuous improvements and excellence in the organization by altering the behaviour of its members
to improve efficiency and quality. It also “concentrates on professional training and shaping the
staff’s attitudes as well as maintaining positive public relation.”34 Lean management applies
scientific methods of experimentation and observation to processes and systems in order to achieve
needed improvements in organizations. It respects people who are “on-the-spot,” including both
customers and employees, and promotes a culture of teamwork and shared responsibility in the
workplace.35 Thus, it demonstrates great concern for managing human resources by providing good
atmosphere (one that is employee supportive), proper communication, and appropriate motivation in
the workplace. These are just a few of the management theories and models that have been developed
in recent years, in view of the many contextual differences and complexities that mark modern
management situations.
28 Fred Luthans and Todd I. Stewart, “A General Contingency Theory of Management,” The Academy of
Management Review 2, no. 2 (1977): 182. 29 Olum, “Modern Management Theories and Practices,” 19. 30 Hans J. Thamhain and David L. Wilemon, “Building High Performing Engineering Project Teams,” IEEE
Transactions on Engineering Management 34, no. 3 (1987): 130. Cf., Matteo Gaeta and Rocco Palumbo,
“Comparing two Approaches to Team Building: A Performance Measurement Evaluation,” Team
Performance Management: An International Journal 23, no. 7/8 (2017): 334. Team building, according to
Thmhain and Wilemon, often “determines the performance and success of multidisciplinary efforts” in the
organization. Thamhain and Wilemon, “Building High Performing Engineering Project Teams,” 130. 31 Gaeta and Palumbo, “Comparing two Approaches to Team Building,” 334. 32 Gaeta and Palumbo, “Comparing two Approaches to Team Building,” 334. 33 Łukasz Dekier, “The Origins and Evolution of Lean Management System,” Journal of International Studies
5, no 1 (2012): 49. The roots of Lean comes from the Japanese company of Toyota and thus lean management
is a successor of both Toyota Production System and Lean Manufacturing. 34 Dekier, “The Origins and Evolution of Lean Management System,” 49. 35 Marcela Urteaga, “Lean Management: A Socio-Technical Systems Approach to Change,” STS Roundtable,
Sociotechnical Systems Roundtable Inc., March 16, 2014. http://stsroundtable.com/2014/03/16/lean-
management-a-socio-technical-systems-approach-to-change/ [accessed March 5, 2018].
A Person-Centered Managerial Paradigm for the Workplace
293
7.1.3 The Sociotechnical and Personalist Expanse of Management
Two ideal-typical reactions have driven the search for a new management model, namely the social
and the technological.36 The social reaction, as Lyon observes, consists of two distinct views in the
context of workplace surveillance: the liberal and the Luddite.37. The liberal view argues that since
the adaptation to the information society and consequent increased use of technology in the
workplace are the outcome of an informed democratic process, the development of information
technology and its wide uses are organizationally and socially appropriate and beneficial. Likewise,
the importance this view gives to individual choice and democratic decision-making “is a vital
antidote both to any technological determinism which forecasts that future society will be determined
by new technologies and to any economic determinism that sticks to class relation in any analysis
concerning techno-social phenomena.”38 However, within the context of an organizational
workplace, liberal views seem to favor the neutral capacity of technology and thus have been subject
to criticism. They have been criticized for having a ‘naturalization effect’ – “the display of a natural
attitude that takes surveillant ways of life for granted” – in new digitalized circumstances of the
workplace, where employees are “being colonized by empowering digital ideology.”39 Lyon also, in
this regard, warns about the anti-social potential of IT applications40 that adversely affect
employment relationships. The Luddite perspective, by contrast, goes against the ‘technological
neutrality’ of liberals, holding that any new technologies express new “values and priorities.”
According to the Luddite view, neutrality favoritism takes the side of the “hidden interests of the
dominant group” and overlooks the technological determinism functioning behind it.41 It also
highlights the possibility of manipulation by the ruling class in the context of organizational
surveillance.
Technological reactions focus on the need for Privacy-Enhancing Technologies (PETs) in the
workplace.42 PETs refer to “coherent systems of information and communication technologies that
strengthen the protection of individuals’ private life in an information system by preventing
unnecessary or unlawful processing of personal data or by offering tools and controls to enhance the
individual’s control over his/her personal data.”43 Explaining this a bit further, Günter Schumacher
quotes G.W. Van Blarkom et al. that PETs provide “a system of ICT measures protecting
informational privacy by eliminating or minimising personal data thereby preventing unnecessary or
unwanted processing of personal data, without the loss of the functionality of the information
system.”44 Thus, the notion of PETs is basically a technical concept used organizationally to refer to
36 Mun-Cho Kim, “Surveillance Technology, Privacy and Social Control: With Reference to the Case of the
Electronic National Identification Card in South Korea,” International Society 19, no. 2 (2004): 210. 37 David Lyon, “The Roots of the Information Society Idea,” in Information Technology and Society: A Reader,
eds. Nick Heap, Ray Thomas, Geoff Einon, Robin Mason, Hugh Mackay,52–73 (London: Sage, 1995), 69-
70. 38 Kim, “Surveillance Technology, Privacy and Social Control,” 211. 39 Kim, “Surveillance Technology, Privacy and Social Control,” 211. 40 Lyon, “The Roots of the Information Society Idea,” 69. 41 Kim, “Surveillance Technology, Privacy and Social Control,” 210; Lyon, “The Roots of the Information
Society Idea,” 70. 42 Seda Gürses and Jose M. del Alamo, “Privacy Engineering: Shaping an Emerging Field of Research and
Practice,” IEEE Security & Privacy 14, no. 2 (2016): 42. 43 Faye Fangfei Wang, “Consumer Privacy Protection in the European Union: Legislative Reform driven by
Current Technological Challenges,” in Privacy Protection Measures and Technologies in Business
Organizations: Aspects and Standards, ed. George O.M. Yee, 331-349 (Hershey, PA: Information Science
Reference, 2012), 349. 44 Günter Schumacher, “Behavioural Biometrics: Emerging Trends and Ethical Risks,” in Second Generation
Biometrics: The Ethical, Legal and Social Context, eds. Emilio Mordni and Dimitros Tzovaras, 215-228
A Person-Centered Managerial Paradigm for the Workplace
294
the aim to protect personal identity and data related to a human being.45 Within the context of
surveillance in the workplace, the adoption of PETs is said to improve user confidence by reducing
the unnecessary collection, use, disclosure, or retention of personal data and by empowering
employees to manage their personal data and thus ensure security, confidence and trust.
Colin J. Bennett and Charles E. Raab, in their work The Governance of Privacy: Policy Instruments
in Global Perspective, distinguish two categories of PETs: substitute and complementary. The
former reduces the presence of information in the system, for instance by using encrypted e-mails,
and the latter tries to minimize potential harm of data already in the system, for instance by appeal
to legal principles.46 In this regard, a report submitted to the European Commission in 2010 by
London Economics points out that “to qualify as PETs, technologies have to reduce the risk of
contravening privacy principles and legislation, minimise the amount of personal data being held,
and/or give individuals control over information about them that is being held.”47 The subjective
expectation of privacy is thus ensured for all data subjects as well as data collectors and users.
Similarly, another expected outcome of PETs is increased organizational transparency and a resultant
increase in interpersonal trust. However, though PETs may improve data analysis and processing
practices and thus increase data protection, Schumacher rightly observes that its main “focus is on
static data like name, address, payment credential etc. and does not include any information on [the]
dynamic behaviour”48 of employees and others in the workplace. Another weak point of PETs is that
in order to work well, technological elements of both the user and the service provider have to be
introduced prior to its function.49 This shows that, although PETs are generally perceived as
integrated privacy systems, the conditions needed to guarantee their functioning without revealing
the identity of users are hard to achieve.
The above discussed theories and approaches reveal that no single managerial strategy can be
effectively applied to all situations at all times in organizations. It has to be noted that a few
researchers, like West and Bowman, emphasize that the phenomenon of electronic monitoring is
socially constructed, as technology will both constructively and destructively pursue the ends of its
application.50 Despite there being constant factors across contexts, specific features of the culture in
question will always do much to shape the problems face, and thus addressing these problems will
always depend on the particulars of the given context. Any management model needs to consider
these contextual factors. According to Vorvoreanu and Carl H. Botan, “[t]he experiences of being
surveilled acquires meaning as it is lived and interpreted by people in their organizational context.
Depending on the nature of this social construction, electronic surveillance can be perceived as a
more or less negative experience and can have varying effects.”51 John D. Bustard, in his analysis of
(Dordrecht: Springer, 2012), 224. Cf., G.W. Van Blarkom et al., Handbook of Privacy and Privacy-
Enhancing Technologies (The Hague: College Beschermign Persoonsgegevens, TNO-FEL, 2003). 45 Herman T. Tavani and James H. Moor, “Privacy Protection, Control of Information, and Privacy-Enhancing
Technologies,” Computers and Society 31, no. 1 (2001): 9. 46 Colin J. Bennett and Charles E. Raab, The Governance of Privacy: Policy Instruments in Global Perspective
(Cambridge, MA: MIT Press, 2006), 177-202. 47 London Economics, “Study on the Economic Benefits of Privacy-Enhancing Technologies (PETs),” Report
to the European Commission, DG Justice, Freedom and Society, 2010, 7. Cf.
http://ec.europa.eu/justice/policies/privacy/docs/studies/final_report_pets_16_07_10_en.pdf [accessed by
December 10, 2017]. 48 Schumacher, “Behavioural Biometrics: Emerging Trends and Ethical Risks,” 224. 49 Schumacher, “Behavioural Biometrics: Emerging Trends and Ethical Risks,” 224. 50 West and James S. Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 629. Cf. E. Schmidt
and J. Cohen, The New Digital Age: Reshaping the Future of People, Nations and Business (New York:
Knopf, 2013). 51 Michaela Vorvoreanu and Carl H. Botan, “Examining Electronic Surveillance in the Workplace: A Review
of Theoretical Perspectives and Research Findings,” Paper Presented to the Conference of the International
A Person-Centered Managerial Paradigm for the Workplace
295
the ethical issues surrounding workplace monitoring, emphasizes debates about privacy. Firstly, he
justifies “obvious” monitoring and argues that secret monitoring is indubitably morally wrong;
secondly, he justifies monitoring of commercial aspects that leave out the personal lives of
employees.52 However, our research shows that this discussion cannot be a starting point for
maintaining an equilibrium of employee concerns in surveillance contexts, as the discussion goes
beyond the realm of mere privacy, reaching to the broader categories of power distance and social
sorting and thus raising concerns about social justice. In the same way, the recommended strategies
of workplace monitoring, such as: “significant business justifications, obtaining employee consent,
posting notices, training monitors to focus on job-related behaviours, and surveying workforce
morale,”53 are seldom able to provide an adequate response to this invasive practice.
It is difficult to choose a single theory or approach from among this jungle of options or to synthesise
them into an alternative method. Both employers and employees have different views and motives,
which vary between organizations. These motives change as they are exposed to various experiences
in the workplace. This situation makes it necessary for managers to look for different strategies at
different times and in different situations with different persons. Apart from the rational economic
view and mechanized concentration on employees, our discussion must include the complex
employee perspective in order to make clear employees, as human beings with self-worth and self-
actualization and having different perspectives, aspirations, potentials and needs, cannot be managed
like the other resources an organization may have.54 It is therefore crucial that employees be
approached from a human perspective rather than an economic or technocratic perspective. A
humanistic perspective with a person-centered approach will provide a significant contribution to the
effort to navigate the complexities of individual and organizational management.
From employees’ perspectives and experiences, as our empirical study and some of our other
previous considerations have shown, external surveillance practices are not effective ways to increase
productivity or workplace efficiency. Allowing for employee autonomy and freedom, by contrast,
combined with self-control and responsibility, has clear benefits in any working environment.55 So,
what is needed is a management approach that exhibits genuine human concern. This also leads to
person-centered thinking, grounded within the value framework of the rights and interests of both
the individual (dignity, autonomy, freedom, independence, choice) and of society (coproduction,
cooperation, respect for the other, common good).56 Person-centered thinking focuses on individuals
or persons as the unit of analysis for moral judgments, rather than on acts. Rosenblat et al. observe
Communication Association, Acapulco, Mexico, 2000, 24-25. Cf. Eileen M. Otis and Zheng Zhao,
“Producing Invisibility,” in Invisible Labour: Hidden Work in the Contemporary World, eds. Marion Crain,
Winifred R. Poster and Miriam A. Cherry, 148-169 (California: University of California, 2016), 151. 52 John D. Bustard, “Ethical Issues Surrounding the Asymmetric Nature of Workplace Monitoring,” in Human
Aspects of Information Security, Privacy and Trust, eds. Theo Tryfonas and Ioannis Askoxylakis, 226-235
(Berlin: Springer, 2013), 233. 53 West and Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 645. 54 Abdelkarim Kitana, “Overview of the Managerial Thoughts and Theories from the History: Classical
Management Theory to Modern Management Theory,” Indian Journal of Management Science 6, no.1
(2016): 20. 55 Steve Lohr, “Workplace Surveillance and the ‘Transparency Paradox,’” The New York Times, June 21, 2014.
http://bits.blogs.nytimes.com/2014/06/21/workplace-surveillance-andthe-transparency-paradox/ [accessed
December 05, 2017]; Steve Lohr, “Unblinking Eyes Track Employees: Workplace Surveillance Sees Good
and Bad,” The New York Times, June 22, 2014. http://www.nytimes.com/2014/06/22/technology/workplace-
surveillance-sees-goodand-bad.html [accessed December 05, 2017]; and Arne L. Kalleberg, Good Jobs, Bad
Jobs: The Rise of Polarized and Precarious Employment Systems in the United States, 1970s-2000s (New
York: Russell Sage Foundation, 2011). 56 Helen Sanderson and Jaimee Lewis, A Practical Guide to Delivering Personalisation; Person-Centred
Practice in Health and Social Care (London: Jessica Kingsley Publishers, 2012), 24.
A Person-Centered Managerial Paradigm for the Workplace
296
in this regard that “[s]ometimes the absence of surveillance can be just as rewarding as a system that
uses employee monitoring to identify and reward workers based on how that system scores their
performance.”57 The need to give employees a significant place, valuing their dignity as human
persons, is widely recognized. This marks the significance of a humanistic perspective in workplace
surveillance ethics. Complementing various other approaches to humanistic management, such as
those centered on human motivations and organizational culture, Melé presents a new, emerging
approach that regards an organization as a real community of persons.58 This consideration will be
explored and described extensively in the final section.
Person-centered management, as part of a humanistic approach and as noted by Melé, can be defined
either as a concept of management that “emphasizes the human condition and is oriented to the
development of human virtue, in all its forms, to its fullest extent,”59 or as “fundamentally a concept
of management that upholds the unconditional human dignity of every woman and man within an
economic context.”60 Whatever perspective one takes, the human person in his or her entirety has
been given importance here. This approach in fact “emphasizes the significance, uniqueness and
inviolability of the person, as well as the person’s essentially relational or communitarian
dimension.”61 It takes shape as a reaction against several socio-political and technological tendencies
to treat the human being simply as an object, a means, and not an end. As a perspective, the person-
centered approach reacts against the reductionistic tendencies of materialistic ideologies and affirms
the centrality of the person, valuing his or her subjectivity, autonomy, dignity and participation and
solidarity in a community.62 We choose to focus on the person-centered approach here because it
better understands employees where they are, including in terms of their needs and wants, rights and
duties, job satisfaction and commitment, relationships with others, individual well-being and
organizational development. This type of person-centered strategy and management processes thus
has implications for both individual and organizational well-being and can help us to understand the
situation of employees who are sidelined from mainstream consideration.
7.1.4 Purposeful Organization and Sustainable Human Resource Management
An organization undergoes a transformative change when it moves from seeing itself as a machine
to seeing itself as a living system – “organization-as-living-system.”63 This transformation can be a
starting point for adopting a person-centred approach in an organization.64 The purposeful
57 Alex Rosenblat, Tamra Kneese and Danah Boyd, “Workplace Surveillance,” Open Society Foundations’
Future of Work Commissioned Research Papers (New York, Data & Society Research Institute, 2014), 12. 58 Domènec Melé, “The Challenge of Humanistic Management,” Journal of Business Ethics 44, no. 1 (2003):
77-88. 59 Melé, “The Challenge of Humanistic Management,” 79. Cf. Alma Acevedo, “Personalist Business Ethics
and Humanistic Management: Insights from Jacques Maritain,” Journal of Business Ethics 105, no. 2 (2012):
199. 60 Heiko Spitzeck, “An Integrated Model of Humanistic Management,” Journal of Business Ethics 99, no. 1
(2011): 51. Cf. Acevedo, “Personalist Business Ethics and Humanistic Management,” 199. 61 Acevedo, “Personalist Business Ethics and Humanistic Management,” 202. Cf., J. Thomas Whetstone,
“Personalism and Moral Leadership: The Servant Leader with a transforming Vision,” Business Ethics: A
European Review 11, no. 4 (2002): 385-392. 62 Whetstone, “Personalism and Moral Leadership,” 385-386. 63 Giles Hutchins, “5 Ways to Transform Your Organization into a Purposeful Living System,” Leadership,
August 26, 2016, https://www.sustainablebrands.com/news_and_views/leadership/giles_hutchins/5_
ways_transform_your_organization_purposeful_living_system [accessed October 20, 2018]. 64 It represents a change from “mechanistic linearity of command-and-control cultures and ‘human resorce’
management [... to] a more human approach to our way of working.” Hutchins, “5 Ways to Transform Your
Organization into a Purposeful Living System,” Leadership, August 26, 2016,
A Person-Centered Managerial Paradigm for the Workplace
297
organization model of Clive Wilson gives evidence of this. Wilson associates the design of a
purposeful organization with eight concepts: purpose, vision, engagement, structure, character,
results, success and talent.65 Through this model, he demonstrates the purpose of an organization’s
existence, which he maintains is context-driven, strategically anchored and stakeholder-driven.66 The
notion of purpose is increasingly used today, he writes, “to capture the amalgam of strategy, culture
change, and value creation required for 21st-century firms to thrive under today’s challenging
business conditions and institutional context.”67 This explains how management can deploy purpose
as a strategic anchor, and that this purpose includes a consideration of the needs of all stakeholders
within an organization.68 This moves an organization beyond the boundaries of the transactional
performance of a business or market system to a purpose-centred enterprise that releases the talent,
creativity and engagement of all involved. A purposeful organization promotes a moral self
(identity), a vision for its functioning, and an ethical approach to management, marked by a
commitment to all its stakeholders.69 For instance, Wilson here affirms that for any organization to
be successful, it must be purpose-driven – must give inspiring reasons for its existence, compelling
from the perspectives of all its stakeholders.
The notion of a purposeful organization is differently designated by Andrew White et al. as a
“purpose-led organization,” though it means the same.70 A purposeful organization also looks for the
structure of the organization, in which it is built and in which it moves.71 Along with this structure,
the character of the organization (its culture) and the character of the individuals within it
(employees) have important roles to play.72 The character of employees must be aligned with the
vision and purpose of the organization and has vital power in ensuring the achievement of the goals
of the organization. Since purposeful organization integrates its action with all stakeholders, it
provides opportunities for synergism or cooperation with each other as people become aware of one
another’s present and future capabilities.73 This model of a purposeful or purpose-led organization is
important in our discussion of a person-centered approach because it focuses on the purpose of the
organization and of the employees who work for the organization. Similarly, the notion of shared
purpose effects employees’ satisfaction, engagement and sustained performance and thus benefits
society as well.74 This helps us to see the organization through the lens of employees, in such a way
as to promote its better functioning. For the recognition of purpose at the individual level will
integrate into the organization’s purpose and aspires to effect a purposeful or purpose-led
transformation in organizational functions. The logic of purposeful organizations puts in question
the need for surveillance and strict monitoring, according to the underlying principle that employees
who are purpose-led and engaged better serve the organization through their responsible and
dedicated pro-organizational attitudes and behaviours. In all these ways, the institutional view of
https://www.sustainablebrands.com/news_and_views/leadership/giles_hutchins/5_ways_transform_your_or
ganization_purposeful_living_system [accessed October 20, 2018]. 65 Clive Wilson, Designing the Purposeful Organization: How to Inspire Business Performance Beyond
Boundaries (London: Kogan page Limited, 2015), 8-220. 66 Wilson, Designing the Purposeful Organization, 15-17. 67 Andrew White, Basak Yakis-Douglas, Heli Helanummi-Cole and Marc Ventresca, “Purpose-Led
Organization: “Saint Antony” Reflects on the Idea of Organizational Purpose, in Principle and Practice,”
Journal of Management Inquiry 26, no. 1 (2017): 101. 68 Wilson, Designing the Purposeful Organization, 16. 69 Wilson, Designing the Purposeful Organization, 2. 70 White et al., “Purpose-Led Organization: “Saint Antony” Reflects on the Idea of Organizational Purpose, in
Principle and Practice,” 101-107. 71 Wilson, Designing the Purposeful Organization, 89-112. 72 Wilson, Designing the Purposeful Organization, 117-144. 73 Mark Frohman and Perry Pascarella, “Managing Change: Creating the Purposeful Organization,” Industry
Week 229, no. 5 (1986): 46-47. 74 Wilson, Designing the Purposeful Organization, 11.
A Person-Centered Managerial Paradigm for the Workplace
298
person-centred approach accords with Wilson’s and White’s models of the purposeful or purpose-
led organization. And since organizations are comprised of individuals, their motivations and needs
must be respected when we talk about organizational purpose and culture.
This notion of a purposeful organization also includes “sustainable human resource management”
(Sustainable HRM), an inclusive approach to action recognising decisions in organizations affect the
lives of all persons concerned. Based on the ethical stance of human resource management, a growing
interest has been placed on various stakeholders in corporate-level issues, where the ethical treatment
of employees has taken the prime position along with the other two categories of financial
transparency and environmental protection.75 Sustainable HRM can be broadly defined as “the
adaption of HRM strategies and practices that enables the achievement of financial, social and
ecological goals, with an impact inside and outside of the organization and over a long-term time
horizon while controlling for unintended side effects and negative feedback.”76 A key part of this
definition is human sustainability in all its aspects. Sustainable HRM, as Ehnert et al. state, commits
to refraining from pursuing short-term cost-driven HRM practices that harm employees and their
families or communities.77 It also promotes proactive steps to develop mutually beneficial and
regenerative relationships between employees and different resource providers, and thus nurtures
employees as a longer-term investment to achieve greater functioning both for employees and the
organization.78 Sustainable HRM is thus a collaborative HR development “facilitating employee
participation, open communication, work roles, and performance evaluation focused on building
employee strengths and facilitating performance.”79 It also promotes trust between employees and
managers in a given situation.
Similarly, sustainable HRM seeks to achieve positive human or social outcomes by the
implementation of sustainable work systems, and thus facilitates employees’ work-life balance
without compromising performance.80 Likewise, researchers opine that “the aspect of humanity
should be brought back into the discussion about the future of HRM [... and] this will build a healthy
and effective organization.”81 Modern HRM views employees as a significant asset to the
organization and accords importance to employees’ needs, preferences and perspectives.82 This is an
important tenet of the person-centered perspective of the humanistic approach as well. Jeanette N.
Cleveland et al. argue that “we can improve organizational performance by investing in long-term,
developmental relationships with employees, as opposed to restricting the relationships to contractual
agreements where employees’ employment is counted in weeks or months and relationships are
75 Maria Järlström, Essi Saru and Sinikka Vanhala, “Sustainable Human Resource Management with Salience
of Stakeholders: A Top Management Perspective,” Journal of Business Ethics 152, no. 3 (2018): 703. 76 Ina Ehnert, Sepideh Parsa, Ian Roper, Marcus Wagner, and Michael Muller-Camen, “Reporting on
Sustainability and HRM: A Comparative Study of Sustainability Reporting Practices by the World’s Largest
Companies,” The International Journal of Human Resource Management 27, no. 1 (2016): 90. See also, Asta
Savaneviciene and Zivile Stankeviciute, “Smart Power as A Pathway for Employing Sustainable Human
Resource Management,” Inzinerine Ekonomika-Engineering Economics 28, no. 2 (2017): 198; Järlström,
Saru and Vanhala, “Sustainable Human Resource Management with Salience of Stakeholders,” 704. 77 Ehnert et al., “Reporting on Sustainability and HRM,” 90. 78 Ehnert et al., “Reporting on Sustainability and HRM,” 90. 79 Järlström, Saru and Vanhala, “Sustainable Human Resource Management with Salience of Stakeholders,”
705. 80 Järlström, Saru and Vanhala, “Sustainable Human Resource Management with Salience of Stakeholders,”
705. 81 Jeanette N. Cleveland, Zinta S. Byrne and T.M Cavanagh, “The Future of HR is RH: Respect for Humanity
at Work,” Human Resource Management Review 25, no. 2 (2015): 146-161; Järlström, Saru and Vanhala,
“Sustainable Human Resource Management with Salience of Stakeholders,” 706. 82 Cleveland, Byrne and Cavanagh, “The Future of HR is RH,” 146.
A Person-Centered Managerial Paradigm for the Workplace
299
“constrained by the explicit and economic language of the contract.”83 This shows how the very
nature of employee-organization relationship marks the difference in bringing human resource-based
view of organizational development. Cleveland et al., in this regard, show that organizations that are
committed to their employees secure the total commitment of employees as well – those who “invest
the most,” “get the most.”84 This view also runs against instrumental views that perceive employees
through the prism of usefulness. Thus, the individual is the core of the sustainable human resource
system.
In their research, Järlström, Saru and Vanhala identify four dimensions of sustainable HRM, namely:
“Justice and equality, transparent HR practices, profitability, and employee well-being.”85 The first
of these, justice and equality, concerns the ethical responsibilities of law-abiding and seeks
exemplary behaviour on the part of authorities, including the proper management of employment
relationships.86 This dimension also stresses diversity among employees and their equal treatment,
and thus gives a new meaning to sustainability consisting equality and appreciation among
employees. It is similar to the fair treatment we have already discussed. The second dimension
requires and demands transparent HR practices in “recruitment, resource allocation, competence
development, rewarding, [employee] participation, and flexibility practices.”87 Third, the
profitability dimension, looks for organizational effectiveness through the integration of HRM and
strategy, proactiveness in action, long-term thinking, etc., along with financial outcomes.88 What is
most important in our discussion is the final dimension: employee well-being. It promotes a
leadership style that cares for and supports employees, showing due respect. This dimension shows
that employees are not mere resources to be exploited, but assets to be developed.89 Employee well-
being here implies well-being, health-related thinking, physical and mental demands, safeguarding
work relationships with others and work-life balance. The sustainable HRM in the individual realm
of employees here promotes practices that foster the mental and physical health or well-being of
employees.90 All these show a shift toward an employee-centred perspective of people management.
Thus, both purposeful organization and sustainable HRM offer an institutional context of a person-
centred approach of employee management.
83 Cleveland, Byrne and Cavanagh, “The Future of HR is RH,” 150. 84 Cleveland, Byrne and Cavanagh, “The Future of HR is RH,” 150. One of the propositions of Cleveland et
al. make this point clear, that: “Organizations where HRM places a priority on the care of employees (by
using alternative approaches to workforce reduction or cutbacks during tough economic times), and attending
to the environmental sustainability of organizations (including green buildings that support the health of
employees) will retain more highly committed, engaged, and productive employees because their overall
health and well-being are secured — not just within themselves, but within their community and family
realm.” Cleveland, Byrne and Cavanagh, “The Future of HR is RH,” 150. 85 Järlström, Saru and Vanhala, “Sustainable Human Resource Management with Salience of Stakeholders,”
708. 86 Järlström, Saru and Vanhala, “Sustainable Human Resource Management with Salience of Stakeholders,”
709. Cf. Michelle Greenwood, “Ethical Analyses of HRM: A Review and Research Agenda,” Journal of
Business Ethics 114, no. 2 (2013): 355-366. For Greenwood, the HRM is an “inherently ethical activity in
that its fundamental core is concerned with the treatment of humans.” Greenwood, “Ethical Analyses of
HRM: A Review and Research Agenda,” 355. 87 Järlström, Saru and Vanhala, “Sustainable Human Resource Management with Salience of Stakeholders,”
710. Cf. Ehnert et al., “Reporting on Sustainability and HRM,” 88-108. 88 Järlström, Saru and Vanhala, “Sustainable Human Resource Management with Salience of Stakeholders,”
711. 89 Järlström, Saru and Vanhala, “Sustainable Human Resource Management with Salience of Stakeholders,”
712. Cf. Mick Marchington, “Human Resource Management (HRM): Too Busy Looking Up to See Where It
is Going Longer Term?” Human Resource Management Review 25, no. 2 (2015): 176-187. 90 Järlström, Saru and Vanhala, “Sustainable Human Resource Management with Salience of Stakeholders,”
713.
A Person-Centered Managerial Paradigm for the Workplace
300
7.2 LABOURER VALUED MANAGEMENT (LVM): AN INTEGRATIVE ETHICAL ALTERNATIVE
In organizations, a person-centered approach to management can help employees to define their role
and work toward a common goal without forsaking their individuality. It challenges behaviours that
perpetuate power distance, control and discrimination. It has already been discussed that surveillance
makes employees feel as though they are in an automated machine, like the panopticon or assembly
line. According to Rosenblat et al., “if de-skilling workers in the Taylorist management model leads
to resistance by workers who do not enjoy participating in automated efficiency systems, humanizing
their workplaces with space for privacy and discretion can encourage good workers to give their
labour and knowledge more willingly.”91 At this juncture, we will introduce a new strategic
management framework of workplace surveillance, namely “Labourer Valued Management”
(LVM), in an effort to reestablish ethical behavior in the workplace. LVM is a management strategy
that gives predominant consideration and value to employees’ dignity, rights, autonomy, and
freedom, consisting of equality, justice and fairness in treatment, and providing ample opportunities
to grow and develop. LVM integrates an interactive partnership model (employer-employee
partnership) with a life-centered ethic, shifting the debate over workplace surveillance from ‘auto
mode’ or ‘techno mode’ to ‘human mode.’ LVM can also be called the “Labourer-Value-Approach,”
since priority or importance is given to what is called value-oriented management, creating labourer-
value or employee-value in the organization. Thus, the aim of this approach is to increase the
employee value in each situation, including situations of workplace surveillance. Similarly, it is
important for any organization to pursue employee-friendly behavioural policies to avoid losses of
confidence and trust among employees.
7.2.1 LVM: Echoing Employees’ Dignity, Rights and Justice
The first principle of LVM is to value the dignity of employees in its entirety. For due to ubiquitous
surveillance practices in the workplace, which invade and intrude upon employees’ privacy,
autonomy and freedom, it is human dignity itself that is ultimately dishonored and degraded. Human
dignity is important also because the value given to work is determined by the very fact that a human
person does it, in order that a human purpose should be fulfilled. The term ‘dignity’ is defined as “a
personal sense of worth, value, respect, or esteem that is derived from one’s humanity and individual
social position; as well as being treated respectfully by others.”92 Recognising the fact that “all human
beings possess dignity in virtue of being human,” Timo Jütten argues that “living a dignified life
requires two forms of social recognition: respect and social esteem.”93 The notion of respect,
according to Jütten, “recognises the personhood of the individual subject and is equally owed to
every subject,” while the notion of “esteem recognises a particular quality of an individual subject
and is owed to all and only those subjects who possess the esteemed quality.”94 So social esteem is
in fact included as a part of the individual esteem, with regard to the dignity of human person.
Researchers show, in this regard, that by emphasizing human dignity, employees’ individual and
social rights are protected, while “making employees work under constant surveillance contravenes
human dignity and is not necessarily productive.”95 This means that a subjects’ human dignity, along
with other legitimate rights and interests, is the central theme of all general data protection
91 Rosenblat, Kneese and Boyd, “Workplace Surveillance,” 12. 92 Kristen Lucas, “Workplace Dignity: Communicating Inherent, Earned, and Remediated Dignity,” Journal
of Management Studies 52, no. 5 (2015): 622. 93 Timo Jütten, “Dignity, Esteem, and Social Contribution: A Recognition-Theoretical View,” The Journal of
Political Philosophy 25, no. 3 (2017): 259. 94 Jütten, “Dignity, Esteem, and Social Contribution,” 259. 95 Yohei Suda, “Monitoring E-mail of Employees in the Private Sector: A Comparison Between Western
Europe and the United States,” Washington University Global Studies Law Review 4, no. 2 (2005): 247.
A Person-Centered Managerial Paradigm for the Workplace
301
regulations and acts.96 Thus the dignity of human beings supports employees’ sense of self-worth
and helps them appreciate that their own existence and presence in the workplace has meaning and
value.
The notion of human dignity is the basis and foundation of all human rights and even the cornerstone
for constitutional acts and declarations on human rights in various contexts.97 For instance, the
preamble of UDHR states that the “recognition of the inherent dignity and of the equal and
inalienable rights of all members of the human family is the foundation of freedom, justice and peace
in the world.”98 UDHR also affirms the equal dignity and rights of all human beings in its article 1,
and appeals to the concept of dignity in reference to social rights in articles 22 and 23.99 Willy Moka-
Mubelo quotes the International Covenant on Civil and Political Rights and the International
Covenant on Economic, Social and Cultural Rights, affirming that the “recognition of the inherent
dignity and of the equal and inalienable rights of all members of the human family is the foundation
of freedom, justice and peace in the world, recognizing that these rights derive from the inherent
dignity of the human person.”100 Constitutional and federal laws and acts are in force in several
countries and in the constitutions of regional organizations that appeal to the idea of human dignity
to speak about fundamental human rights.101 In this way, the authentic value and preservation of
employee dignity and employee rights are salient features of LVM in the workplace, in particular in
the context of workplace surveillance.
Kirsten Lucas illustrates some of the theoretical foundations of workplace dignity, starting from its
distinct meanings as either inherent or earned. The former speaks of “an unconditional God-given
dignity” that one has as a “consequence of being human,” while the latter speaks of its “conditional
aspects,” gained through qualities and efforts or from instrumental contributions in workplace
contexts.102 The latter here seems to suggest that dignity is hierarchical in nature. However, Andrew
Brennan and Y. S. Lo argue that “the modern notion of dignity drops the hierarchical elements
implicit in the meaning of dignitas, and uses the term so that all human beings must have equal
dignity, regardless of their virtues, merits, actual social and political status, or any other contingent
features.”103 Brennan and Lo continue, observing that this notion of dignity also involves universal
96 Yuan Stevens and Joanna Bronowicka, “Workplace Surveillance: Is Our Privacy Protected at Work?” Centre
for Internet and Human Rights, December 2016. https://cihr.eu/workplace-surveillance-is-our-privacy-
protected-at-work/ [accessed December 15, 2017]. 97 Willy Moka-Mubelo, “Human Rights and Human Dignity,” in Reconciling Law and Morality in Human
Rights Discourse: Beyond the Habermasian Account of Human Rights, ed. Willy Moka-Mubelo (Cham:
Springer, 2017), 89-125. 98 United Nations General Assembly. The Universal Declaration of Human Rights. (Originally proclaimed on
December 10, 1948). Cf., United Nations, “Preamble,” The Universal Declaration of Human Rights, 2015,
1. http://www.un.org/en/udhrbook/pdf/udhr_booklet_en_web.pdf [accessed December 15, 2017]. Cf., Moka-
Mubelo, “Human Rights and Human Dignity,” 90. Hereafter, the Universal Declaration of Human Rights will
be referred as UDHR only with article umbers. 99 UDHR, 1, 22 and 23. Cf., Moka-Mubelo, “Human Rights and Human Dignity,” 90. 100 Moka-Mubelo, “Human Rights and Human Dignity,” 91. Cf. United Nations Human Rights Office of the
High Commissioner for Human Rights, International Covenant on Civil and Political Rights,
http://www.ohchr.org/en/professionalinterest/pages/ccpr. aspx [accessed December 15, 017]. 101 Moka-Mubelo, “Human Rights and Human Dignity,” 91. 102 Lucas, “Workplace Dignity: Communicating Inherent, Earned, and Remediated Dignity,” 622-623. Cf.
Claus Dierksmeier, “Reorienting Management Education: From Homo Oeconomicus to Human Dignity,” in
Business Schools Under Fire: Humanistic Management Education as the Way Forward, eds. Wolfgang
Amann Michael Pirson, Claus Dierkmeier, Ernst von Kimakowitz, and Heiko Spitzeck (New York: Palgrave
Macmillan, 2011), 19-40; Andrew Brennan and Y. S. Lo, “Two Conceptions of Dignity: Honour and Self-
Determination,” in Perspectives on Human Dignity: A Conversation, eds. Jeff Malapss and Norelle Lickiss
(Dordrecht: Springer, 2007), 43-58. 103 Brennan and Lo, “Two Conceptions of Dignity: Honour and Self-Determination,” 47.
A Person-Centered Managerial Paradigm for the Workplace
302
human rights, and the intrinsic value or sanctity of human life: “These rights, and the associated
dignity, are no longer fragile, but are guaranteed to all who are born human.”104 Here dignity appears
as something democratic and egalitarian. Lucas states, concerning dignity, that it is “subjectively
experienced and judged” by individuals, and augmented by the application of “commonly-held
standards” of interaction to value the dignity of others along, with one’s own dignity.105 So, the
dignity that LVM looking for in the workplace is a dignity that is equal and guaranteed to all
employees and which is inherent in each human being.
The third argument Lucas makes concerns the normative expectations tied to dignity. He finds the
roots of this in Christian theology, Kantian philosophy and business ethics, all of which emphasise
moral imperatives. This leads to the fourth point concerning the nature of employment relationship
that is “frequently at odds with achieving dignity.”106 The difference between a Christian theology
of dignity and the view of Kantian philosophy is that the former alludes to God’s grace, while the
latter grounds dignity in humanity’s rational agency, autonomy and freedom.107 In this present
research, we understand human dignity to refer to both of these notions. The secular justification of
human dignity comes from the Kantian understanding of the “Categorical Imperative, according to
which everyone must be treated with respect.” According to Moka-Mubelo, this “is the best-known
non-religiously-based conception of dignity.”108 Moka-Mubelo quotes Kant and states that the
“subjective foundation of human morality consists of the dispositions of self-respect and respect for
others.”109 Human dignity is an expression of this morality. This approach matches quite well with
the understanding of human dignity and work in the Catholic tradition, which gives priority to the
subjective character of work over its objective character. We will explore this in what follows
through an analysis of Catholic Social Teaching and specifically of Laborem Exercens110 (On Human
104 Brennan and Lo, “Two Conceptions of Dignity: Honour and Self-Determination,” 47. Italics in the quote is
maintained as in the original source. 105 Lucas, “Workplace Dignity: Communicating Inherent, Earned, and Remediated Dignity,” 623. Cf. Man Yee
Karen Lee, “Universal human dignity: some reflections in the Asian context,” Asian Journal of Comparative
Law 3, no. 1 (2008): 283–313. 106 Lucas, “Workplace Dignity: Communicating Inherent, Earned, and Remediated Dignity,” 623. Cf.
Ferdinand Tablan, “Catholic Social Teachings: Toward a Meaningful Work,” Journal of Business Ethics 128
no. 2 (2015): 291-303; Andrew Brennan and Y. S. Lo, “Two Conceptions of Dignity: Honour and Self-
Determination,” in Perspectives on Human Dignity: A Conversation, eds. Jeff Malapss and Norelle Lickiss
(Dordrecht: Springer, 2007), 43-58. 107 Brennan and Lo, “Two Conceptions of Dignity: Honour and Self-Determination,” 47. The religious
response is that “all human beings have an equal unconditional value which is: (a) Non-instrumental (i.e.
independent of their usefulness); (b) Intrinsic (i.e. dependent on their intrinsic qualities); and (c) Necessary”
(God’s unconditional love for all human beings). Replacing God with ‘ideal agents’ otherwise called fully
rational agents, Kant argues for human dignity as rational agents valuing it and thus “all human beings have
equal intrinsic and necessary value.” Brennan and Lo, “Two Conceptions of Dignity: Honour and Self-
Determination,” 8-49. 108 Moka-Mubelo, “Human Rights and Human Dignity,” 95. Cf. Emmanuel Kant, Groundwork for the
Metaphysics of Morals, ed. and trans. Allen W. Wood (New Haven: Yale University Press, 2002). As I
understand this Kantian categorical imperative is more or less in relation with the duty and it has various
ramifications. 109 Moka-Mubelo, “Human Rights and Human Dignity,” 96. Cf., Roger J. Sullivan, Immanuel Kant’s Moral
Theory (Cambridge: Cambridge University Press, (originally in 1989) 1995), 193. 110 Laborem Exercens (LE) perceives the work as a fundamental dimension of human existence. It brings a
distinction between the objective and subjective dimensions of work and emphasises the deep connection
between work and personal dignity. The objective dimension of work considers the external result of the work
by way of product or service, by any worker, while the subjective dimension reflects the inner results of work
considering human dignity and fully becoming flourishing of one’s humanness. It looks for worker becoming
more of a human being and thus enforces the priority of labour over capital. Cf., John Paul II, “Laborem
Exercens,” AAS 73 (1981), http://w2.vatican.va/content/john-paul-ii/en/encyclicals/documents/hf_jp-
ii_enc_14091981_laborem-exercens.html [accessed December 15, 2017].
A Person-Centered Managerial Paradigm for the Workplace
303
Work), the 1981 encyclical by Pope John Paul II, as this document situates work clearly within the
context of a personalist anthropology,111 giving importance to the dignity of the human person and
the subjective dimension of work. We also consider the relevance of the Catholic work ethic, with
its concern for human dignity and the subjective dimension of work in the context of organizational
surveillance.
However, before considering the dignity of workers from a Christian perspective, it will be helpful
to briefly consider the idea of the expectation of the meaningful work. For as we have seen from an
employee perspective, workplace surveillance can be a hurdle for meaningful work, job-satisfaction
and socialization. Ferdinand Tablan quoes James O’Toole and Edward Lawler, stateing that
employees today need a “meaningful employment and the opportunity to grow and develop as a
person.”112 This means that what employees expect from work is a feeling of being useful by
participation in a collective effort to work “in an environment that respects fairness and dignity.”113
This assessment of work with employees’ dignity is also considered a part of ethical human rights.114
Tablan, similarly, referring to Norman E. Bowie, writes that “providing meaningful work is one
possible and rather effective way for a firm to honour the requirement that it respects the humanity
of its employees […].”115 The notion of meaningful work has several constituent parts: for example,
the conventional subjective view of individual interests and the derivation of personal satisfaction
from the activity itself, as well as the objective-normative approach that refers to a telos or purpose
and what the work creates for individual and community; also, the notion of sensus or sense-making,
the intention and values of individuals who do the work; and finally the understanding of a fit between
a person and his or her job, with “a harmonious alignment between work and the individual’s goals,
values, temperament, and lifestyle.”116 From this it is clear that meaningful work actualizes human
potentials of autonomy, creativity and sociality.
Human dignity, or the intrinsic worth of every human being, is associated with varying criteria that,
on the one hand, it can be understood as being grounded in the faith-claim of that every human person
has been created in the imago Dei, the image of God, as emphasized especially in Catholic teachings.
On the other hand, in common language, it is associated with the human capacity to reason and
exercise autonomy, enabling freedom of choice and thus self-determination.117 In the 1961 encyclical
on Christianity and Social Progress, Mater et Magistra, Pope John XXIII, affirming that individual
human beings are “the foundation, the cause and the end of every social institution,” identifies human
dignity, “the sacred dignity of the individual,” as a basic principle of Catholic Social Teaching.118
Even the 1891 encyclical Rerum Novarum (The Condition of Labour) by Pope Leo XIII observes the
111 Anton Stres, “Laborem Exercens and Human Work,” in Work as Key to the Social Question: The Great
Social and Economic Transformations and the Subjective Dimension of Work, Pontifical Council for Justice
and Peace, 23-29 (Vatican City: Libreria Editrice Vaticana, 2002), 23. 112 Tablan, “Catholic Social Teachings: Toward a Meaningful Work.” 291. Originally in: James O’Toole and
Edward E. Lawler III, The new American workplace (New York: Palgrave, 2006), 8. 113 Tablan, “Catholic Social Teachings: Toward a Meaningful Work.” 291. 114 Tablan, “Catholic Social Teachings: Toward a Meaningful Work.” 291. Cf. Al Gini, “Meaningful Work and
the Rights of the Worker: A Commentary on Rerum Novarum and Laborem Exercens,” Thought: Fordham
University Quarterly 67, no. 3 (1992): 226-239. 115 Tablan, “Catholic Social Teachings: Toward a Meaningful Work.” 291. Originally in: Norman E. Bowie,
Business Ethics: A Kantian Perspective (Malden: Blackwell, 1999), 70. 116 Tablan, “Catholic social teachings: toward a meaningful work.” 291-292. 117 Alejo José G. Sison, Ignacio Ferrero and Gregorio Guitián, “Human Dignity and the Dignity of Work:
Insights from Catholic Social Teaching,” Business Ethics Quarterly 26, no. 4 (2016): 503-528. Cf. Meir Dan-
Cohen, “Introduction: Dignity and Its (Dis)content,” in Dignity, Rank, and Rights, ed. Jeremy Waldron, 3-
10 (Oxford: Oxford University Press. 2012), 5-8. 118 John XXIII, “Mater et Magistra,” AAS 53, 1961, no. 219. http://w2.vatican.va/content/john-
xxiii/en/encyclicals/documents/hf_j-xxiii_enc_15051961_mater.html [accessed December 20, 2017].
A Person-Centered Managerial Paradigm for the Workplace
304
dehumanizing conditions of workers in the context of the industrial revolution and provides some
notes on the rights and duties of workers, calling for the proper treatment of workers and respect for
their dignity in the work context.119 Likewise, Laborem Exercens (LE) speaks convincingly about
the nature and condition of labour, and states that human beings are the proper subject of work, which
expresses and increases human dignity.120 The significance of the discussion on LE in this research
is due to its focus on the positive and negative aspects of technology used in the workplace.
LE affirms the constructive use of technologies in facilitating work, while also noting their
disparaging ability to supplant or control humans. It states, for instance,
It [(technology and machineries)] facilitates his work, perfects, accelerates and augments it. It
leads to an increase in the quantity of things produced by work, and in many cases, improves their
quality. However, it is also a fact that, in some instances, technology can cease to be man's ally
and become almost his enemy, as when the mechanization of work “supplants” him, taking away
all personal satisfaction and the incentive to creativity and responsibility, when it deprives many
workers of their previous employment, or when, through exalting the machine, it reduces man to
the status of its slave.121
In any case, LE argues for due respect for the human dignity in the workplace, as any discussion on
the workplace should also concern its subjects – human beings. The subjective dimension of work,
expressed in LE, is a substantial contribution of CST to public discussions of the workplace. It says
that, for instance, “[a]s a person, man is the subject of work and these actions, independent of their
objective content, must serve to realize his humanity, to fulfil his calling to be a person.”122 It also
continues to attribute an ethical meaning to work, stating that “[w]ork is a good thing for man – a
good thing for his humanity – because through work man not only transforms nature, adapting it to
his own needs, but he also achieves fulfilment as a human being and indeed, in a sense, becomes
‘more a human being.’”123 LMV in the workplace argues in support of this experience of being human
in a situation of managerial control by calling for due respect and worth for all members of an
organization. It emphasizes the role of personal values along with other material or economic values
in the workplace. For, as LE rightly situates,
[t]he person who works desires not only due remuneration for his work; he also wishes that,
within the production process, provision be made for him to be able to know that in his work, even
on something that is owned in common, he is working “for himself.” This awareness is
extinguished within him in a system of excessive bureaucratic centralization, which makes the
worker feel that he is just a cog in a huge machine moved from above, that he is for more reasons
than one a mere production instrument rather than a true subject of work with an initiative of his
own.124
This reveals that, again, as Tablan puts it, “[t]he person as a subject cannot be an object. Being an
end in itself, the person cannot be subordinated to other lesser ends or values.”125 However, we have
seen that in the workplace, due to excessive surveillance practices, employees become too often
merely the object of others’ observation and are treated as a mere means to achieve certain goals and
119 Leo XIII, “Rerum Novarum.” 1891. http://w2.vatican.va/content/leo-xiii/en/encyclicals/documents/hf_l-
xiii_enc_15051891_rerum-novarum.html [accessed December 20, 2017]. 120 John Paul II, “Laborem Exercens,” AAS 73 (1981), no. 5. 121 John Paul II, “Laborem Exercens,” AAS 73 (1981), no. 5. 122 John Paul II, “Laborem Exercens,” AAS 73 (1981), no. 6. 123 John Paul II, “Laborem Exercens,” AAS 73 (1981), no. 9. 124 John Paul II, “Laborem Exercens,” AAS 73 (1981), no. 15. 125 Tablan, “Catholic social teachings: toward a meaningful work.” 295.
A Person-Centered Managerial Paradigm for the Workplace
305
objectives. The 1991 encyclical Centesimus Annus (One Hundred Years) by Pope John Paul II,
released on the 100th anniversary of Rerum Novarum, also warns about new threats to human dignity
arising from technology, social structures and corporate greed, exacerbating issues of economic and
social justice and leading to the subordination of workers.126 Centesimus Annus (CA) declares that
“[a] person who is deprived of something he can call ‘his own,’ and of the possibility of earning a
living through his own initiative, comes to depend on the social machine and on those who control
it. This makes it much more difficult for him to recognize his dignity as a person and hinders progress
towards the building up of an authentic human community.”127 Thus CA calls for a fully “humane”
and authentic work culture that respects personal dignity. LVM, in this regard, promotes policies and
regulations in the workplace that respect human dignity, the subjective dimension of work and the
objective rights of employees to shape labour relationships, organizational behaviours, shared social
harmony and the world economy.
To return briefly to the discussion of the imago Dei, we find that David Hollenbach, referring to
various Catholic Social Teachings, offers a triple interpretation of the imago Dei in his work Human
Dignity in Catholic Thought: namely, the substantialist, relational and functional.128 The
substantialist understanding find the inherent image in the very substance of the human person and
thus regards human dignity as “an attribute of the human person affecting the substantial unit of body
and soul.”129 The relational aspects looks to the rational nature of individuals and their openness to
“relationship with others through knowledge,” representing a “double dimension of individuality and
relationality or sociality.”130 This goes beyond the individualistic ethic to acknowledge the social
aspect of human nature and existence. The Compendium of the Social Doctrine of the Church
expresses this social aspect in line with the principle of the common good, stating that this is the
principle “to which every aspect of social life must be related if it is to attain its fullest meaning,
stems from the dignity, unity and equality of all people.”131 The functional view, admitting that
“dignity resides in this functional unit of body and soul,” asks individuals to “take responsibility over
the material world, expressing dignity through their actions.”132 This irreducible principle of the
dignity of the human being and its developmental dynamics is the value to be accorded to it in the
workplace by using LVM to ensure the equal treatment of employees in each situation, in view of
his worth and value.
It also must be noted that the previously discussed rights-oriented approach and social justice
approach are predominant in this model of LVM, due to it emphasis on human dignity and
itspreservation. CSDC rightly points out in this regard that “[t]he rights of workers, like all other
rights, are based on the nature of the human person and on his transcendent dignity.”133 CSDC also
lists some of these rights, non-exclusively, as follows: “a working environment […] which are not
126 John Paul II. “Centesimus Annus.” AAS, 83 (1991). http://w2.vatican.va/content/john-paul-
ii/en/encyclicals/documents/hf_jp-ii_enc_01051991_centesimus-annus.html [accessed December 20, 2017]. 127 John Paul II. “Centesimus Annus.” AAS, 83 (1991), no. 13. 128 David Hollenbach, “Human Dignity in Catholic Thought,” in Cambridge Handbook on Human Dignity:
Interdisciplinary Perspectives, eds. Marcus Düwell, Jens Braarvig, Roger Brownsword and Dietmar Mieth
(Cambridge, UK: Cambridge University Press. 2014), 250–259. 129 Sison, Ferrero and Guitián, “Human Dignity and the Dignity of Work,” 507. Cf. Hollenbach, “Human
Dignity in Catholic Thought,” 253-255. 130 Sison, Ferrero and Guitián, “Human Dignity and the Dignity of Work,” 507. Cf. Hollenbach, “Human
Dignity in Catholic Thought,” 253-255. 131 Pontifical Council for Justice and Peace, Compendium of the Social Doctrine of the Church (London: Burns
and Oates, 2012; reprint, 3), no. 164. (Here after, we will use the abbreviation CSDC of the Compendium of
the Social Doctrine of the Church (CSDC) with paragraph number for its citations). 132 Sison, Ferrero and Guitián, “Human Dignity and the Dignity of Work,” 508. Cf. Hollenbach, “Human
Dignity in Catholic Thought,” 253-255. 133 CSDC, 301. Italics in the quote is maintained as in the original source.
A Person-Centered Managerial Paradigm for the Workplace
306
harmful to the worker’s physical health or to their moral integrity; the right that one’s personality in
the workplace should be safeguarded without suffering any affront to one’s conscience or personal
dignity; […] the right to social security […].”134 LVM likewise is concerned with the whole range of
needs of employees: economic, organizational, socio-cultural, personal and existential, including
spiritual values. For along with protecting employees’ rights and interests, it fosters respect by
honoring employees’ dignity and autonomy and thus reduces the intrusion of privacy and looks for
fair and impartial treatment in workplace behaviours, rejecting the possibility of discrimination or
social sorting. Finally, CST is concerned to promote the genuine progress of the human being and
society by according an authentic respect to all dimensions of individuals as persons, expressed
“whole and entire, body and soul, heart and conscience, mind and will.”135 It is through this process
that LVM effects a shift in the consideration of workplace ideologies and behaviours, taking us from
a techno-mode to a human-mode.
7.2.2 Corporate Citizenship and Transactional, Participatory, and Recognition Ethics
In line with above-mentioned approaches to human dignity and the subjective dimension of work,
the notion of corporate citizenship is very significant. This notion is immersed in the LVM and
enables it to develop an individualized analysis of employee management. Many researchers have
addressed this model and concur that good corporate citizens live up to clear, constructive visions
and possess core values in their organizations.136 Corporate citizenship, understood as analogous with
a social role (rights and duties) in a community, is depicted as “a social role, characterized by the
social contract of business, a participatory ethics of business, the precautionary principle and the
promotion of just international institutions.”137 Here, the whole corporation is metaphorically ‘seen
as’ a citizen,138 having wide-ranging consequences for its behaviour. The active citizenships of the
corporate citizen also means that its members have various functioning roles perform in the
organization. These active citizenship roles, according to Ronald Jeurissen, are “[t]he social contract;
collective responsibility; active responsibility; and the juridical state.”139 In an organizational
context, this is a social (labour) contract of business with institutional responsibilities and
precautionary principles.140 However, as Jeurissen observes, the social contract and just laws must
combine ethics, responsibility and self-interest with a strong moral commitment to the common good
in the organizational workplace.
The corporate citizenship model, just as it deals with the relationship of corporations to external
stakeholders (consumers, government, the environment), also addresses internal corporate
134 CSDC, 301. 135 Vatican Council II. “Gaudium et Spes.” AAS 58 (1966), no. 3.
http://www.vatican.va/archive/hist_councils/ii_vatican_council/documents/vat-
ii_const_19651207_gaudium-et-spes_en.html [accessed December 20, 2017]. 136 Sandra Waddock, “The Development of Corporate Responsibility/Corporate Citizenship,” Organization
Management Journal 5, no. 1 (2008): 29-39; Donna J. Wood and Jeanne Logsdon, “Business Citizenship:
From Individuals to Organizations.” Ethics and Entrepreneurship 3 (2002): 59-94; and Radin and Werhane.
“Employment-at-Will, Employee Rights, and Future directions for Employment.” 119. 137 Ronald Jeurissen, “Institutional Conditions of Corporate Citizenship,” Journal of Business Ethics 53 (2004):
87. 138 Jeurissen, “Institutional Conditions of Corporate Citizenship,” 87. The essential elements of corporate
citizenship are “family-friendly workplaces, employee health and retirement benefits, employee safety and
security and ‘employee participation in workplace productivity’ and community welfare.” Subhabrata Bobby
Banerjee, Corporate Social Responsibility: The Good, the Bad and the Ugly (Cheltenham, UK: Edward Elgar,
2007), 41. 139 Jeurissen, “Institutional Conditions of Corporate Citizenship,” 88. 140 Jeurissen, “Institutional Conditions of Corporate Citizenship,” 89-90.
A Person-Centered Managerial Paradigm for the Workplace
307
relationships between managers and employees.141 To treat employees as citizens is to treat them as
adults, recognizing and granting their dignity as human beings and accordingly respecting their legal
and moral rights and duties.142 This shows that, just like any other form of political or legal
citizenship, rights and duties attend this corporate citizenship. Radin and Werhane illustrate, in this
regard, that in an organization, “the citizen metaphor links people to one another in such a way that
they inevitably take responsibility for working together for the benefit of the firm. At the same time,
the metaphor of citizenship requires that each citizen has equal rights and requires that all citizens be
treated with respect and dignity. According to such a model, employees thus serve as participants in,
and members of, a firm community.”143 The notion of corporate citizenship, therefore, takes
productivity and performance seriously, as loyalty and good performance are expected from citizens
of any community, leading to job satisfaction and an improvement of employee life-chances. This
notion of corporate citizenship is not friendly to any form of external monitoring or surveillance, but
regards with high esteem workplace behaviour that exhibits commitment, mutual trust and
responsibility towards the common goal.
The LVM also highlights a combination of three forms of ethics: the transactional, participatory, and
recognitional ethics of business. It opposes authoritarian or compulsory surveillance as well as the
hierarchical observation of employees by managers. This approach acknowledges that employees or
corporations alone are not responsible for their social and ethical behaviour, but all its members need
to take part in its mutual reinforcement. Henk van Luijk first proposed this form of participatory
ethics, along with a description of the two other domains of ethics noted above: the transactional and
recognitional.144 The moral approach to participatory ethics involves an ethic of the collective good
with a common interest of voluntary solidarity. The members of an organization, as corporate
citizens, “have a moral responsibility to define their due in the promotion of a sustainable society.145
In explaining this participatory ethics, Van Luijk begins by noting the three categories of human
action, calling them self-directed, other-including and other-directed actions.146 According to him,
A self-directed action is an action that intends the actor and the recipient of the benefits of the
action to coincide. The outcome of the action returns in total to the actor […]. An other-including
action is an action in which the actor intends to share with other the position of being the recipient
of the action’s benefits […], whereby the amount and the quality of the results need not be same
for all recipients […]. An other-directed action is finally, is an action with which actor intends
results that exclusively benefit another or others than him or herself.147
These three dimensions of actions determine the kind of person one wants to be. However, a moral
evaluation is not fully possible without considering the interests and rights of each individual and
corporation.148 Here, putting aside the manipulated self-directed actions, where one’s intention
excludes the other, other-included actions seek common interests and equal claims. Van Luik argues
here that “[o]ther-including actions based upon either simultaneous or connected interests and equal
claims are acceptable from a moral point of view when people agree to be moral according to the
141 Radin and Werhane. “Employment-at-Will, Employee Rights, and Future directions for Employment.” 120. 142 Radin and Werhane. “Employment-at-Will, Employee Rights, and Future directions for Employment.” 120.
Cf. Joanne B. Ciulla, The Working Life: The Promise and Betrayal of Modern Work (New York: Random
House Times Books, 2000), 233. 143 Radin and Werhane. “Employment-at-Will, Employee Rights, and Future directions for Employment.” 120. 144 Henk van Luijk, “Rights and Interests in a Participatory Market Society,” Business Ethics Quarterly 4, no.
1 (1994): 79-96. 145 Jeurissen, “Institutional Conditions of Corporate Citizenship,”95. 146 van Luijk, “Rights and Interests in a Participatory Market Society,” 82. 147 van Luijk, “Rights and Interests in a Participatory Market Society,” 82. 148 van Luijk, “Rights and Interests in a Participatory Market Society,” 83.
A Person-Centered Managerial Paradigm for the Workplace
308
principles of a market morality, the principles of equality, honesty and reciprocity.”149 This is
critically referred to as ‘morals by agreement’ by researchers.150 However, according to Van Luijk,
when rational self-interest, respect for the rights and interests of others and a morality of reciprocal
exchange coincide, there emerges a ‘transactional ethics’151 well suited to the workplace. Going
beyond this, other-directed actions are finally altruistic actions, even apart from moral duty. For a
specific moral action, when there is no force to cooperate and when one commits oneself voluntarily,
there arises, what van Luijk calls, a non-enforceable obligation, leading to altruism.152 Here, various
contributors in the workplace recognize their shared rights and interests, which are either lost or
forgotten by incessant surveillance in the workplace, and act rather in pursuit of a common good.
Here participants are also involved in decisions and contribute to their realization, and thus this is
called a ‘participatory ethics.’153
Today, however, the workplace is alarmingly affected by conflicting interests, both of employees
and employers, and stuck with the inequalities of power, rendering its members unable to consider
common interests.154 In the workplace, in a context of continuous surveillance, we find a pure case
of conflicting rights and interests with a strong moral claim. This awareness of the moral issues at
stake leads Van Luijk to introduce the notion of ‘recognition ethics,’155 that recognizes these strong
rights and conflicting interests. It complements both transactional and participatory ethics. There are
researchers who argue that employee involvement in the design and implementation of any system
in the workplace always has a positive impact.156 The exclusion of employees from the design and
implementation of surveillance techniques in particular leads to an increase in hostility of employees
towards monitoring.157 Similarly, G. Stoney Alder, referring to John R. Aiello and Kathryn J. Kolb,
states that when employees “feel that their input has been incorporated in the system adopted, they
may feel greater ownership of their work and experience greater motivation and less stress.”158
Reflecting in line with Van Luijk, in transactional ethics, employees, as abstract equals, claim a
149 van Luijk, “Rights and Interests in a Participatory Market Society,” 85. 150 van Luijk, “Rights and Interests in a Participatory Market Society,” 85. This type of market principles –
morals by agreement – is presented by David Gauthier in his book Morals by Agreement. Cf. David Gauthier,
Morals by Agreement (Oxford: Clarendon Press, 1986). 151 van Luijk, “Rights and Interests in a Participatory Market Society,” 85. 152 van Luijk, “Rights and Interests in a Participatory Market Society,” 85-86. This altruistic behaviour goes
beyond the reciprocal treatment. That means when some one calls it as a reciprocal altruism, it may have
latent selfish motives, which cannot be fully called as other oriented. 153 van Luijk, “Rights and Interests in a Participatory Market Society,” 86. According to van Luijk, this
participatory ethics has two principles – decency and emancipation that the formal implies one should have
solid moral reasons before quitting the opportunity to contribute for the welfare of others, while the latter
concentrate on specific groups who were deprived off the means of development. 154 van Luijk, “Rights and Interests in a Participatory Market Society,” 86. Cf. Foucault, Discipline and Punish:
The Birth of the Prison, 201; Foucault, Power/Knowledge: Selected Interviews and Other Writings, 1972-
1977, 30; Magee and Galinsky, “Social Hierarchy: The Self-Reinforcing Nature of Power and Status,” 351-
398; Clegg, Courpasson and Phillips, Power and Organization, 3; Lyon, Surveillance Society: Monitoring
Everyday Life, 115; and Fleming and Spicer, “Power in Management and Organization Science,” 238. 155 van Luijk, “Rights and Interests in a Participatory Market Society,” 87. 156 G. Stoney Alder, “Employee Reactions to Electronic Performance Monitoring: A Consequence of
Organizational Culture,” Journal of High Technology Management Research 12 (2001): 332; Maureen L.
Ambrose and G. Stoney Alder, “Designing, Implementing, and Utilizing Computerized Performance
Monitoring: Enhancing Organizational Justice,” Research in Personnel and Human Resources Management
18 (2000): 187-219. 157 Alder, “Employee Reactions to Electronic Performance Monitoring,” 332. Cf., Peter A. Susser, “Electronic
Monitoring in the Private Sector: How Closely Should Employers Supervise Their Workers?” Employee
Relations 13 (1988): 575-598. 158 Alder, “Employee Reactions to Electronic Performance Monitoring,” 332-333. Cf., John R. Aiello, and
Kathryn J. Kolb, “Electronic Performance Monitoring and Social Context: Impact on Productivity and
Stress,” Journal of Applied Psychology 80 (1995): 339-353.
A Person-Centered Managerial Paradigm for the Workplace
309
similar space of freedom and cooperation to act for their mutual benefit and thus hasten the progress
of the organization.
Although the participation of all agents, here both employer and employee, cannot be assumed,
participatory ethics does assume a voluntary solidarity in pursuit of a common goal, for example to
increase productivity and efficiency in the workplace.159 This is because of the necessary space given,
as mentioned, to the non-enforceable obligation of each participant. Similarly, recognitional ethics
in the workplace is characterized by an asymmetry of positions and claims, which may change with
circumstances. Here, employees will be forced to recognize claims made by those in authority and
thus take actions out of a sense of duty to those authorities. However, it is acknowledged that,
“[p]articipatory ethics, the ethics of non-enforceable obligations, accompanies the emergence of new
moral opportunities and social initiatives considered utopian before. Recognitional ethics makes us
accept the rights and claims that individuals and groups have acquired in the past. Transactional
ethics makes us cooperate for mutual benefit in the present”160 So, although not individually, in a
complementary sense these three ethical branches make sense as a means of valuing the employee
vis-à-vis the employer in situations where conflicts of rights and interests arise in the organizational
workplace.
7.2.3 Organizational Identification and Organizational Justice
LVM leads to a process of organizational identification on the part of employees. When employees
feel that they are valued and respected, there arises a course of organizational identification that
assures the firm acceptance of decisions made by the organization. G. Stoney Alder and Phillip K.
Tompkins refer to Herbert A. Simon, who argues that “organizational identification and loyalty lead
members to evaluate courses of action in terms of the consequences of their actions for the
organization when making decisions.”161 In this case, employees adhere to the decisions of the
organization even at the expense of a degree of their autonomy and personal space. Alder and Phillip
K. Tompkins rightly maintain that such organizational identification “leads members to adopt an
organization personality […] whereby, within an area of acceptance or zone of indifference […], the
employee plays the role of organization and accepts the organization’s premises as relevant to
decisions.”162 Employees allow and accept organizational decisions since they feel that “the
organization becomes as much a part of the member as the member is a part of the organization.”163
This in fact eliminates the possibility of conflicting individual or organizational interests. Alder and
Tompkins also warn that this employee identification is not a static phenomenon;164 rather it can take
various forms and either strengthen or diminish in degree due to various managerial practices.
In the same way, organizational justice inevitably plays a creative role in LVM. There are researchers
who argue that organizational fairness or perceived justice in the workplace “results in higher loyalty,
commitment, satisfaction, and performance.”165 We have already discussed in the first chapter the
159 van Luijk, “Rights and Interests in a Participatory Market Society,” 88. 160 van Luijk, “Rights and Interests in a Participatory Market Society,” 93. 161 G. Stoney Alder and Phillip K. Tompkins, “Electronic Performance Monitoring: An Organizational Justice
and Concretive Control Perspective,” Management Communication Quarterly 10, no. 3 (1997): 268. Cf.,
Herbert A. Simon, Administrative Behaviour: A Study of Decision-Making Process in Administrative
Organization (New York: Free Press, 1976), 205. 162 Alder and Tompkins, “Electronic Performance Monitoring,” 269. 163 Alder and Tompkins, “Electronic Performance Monitoring,” 269. 164 Alder and Tompkins, “Electronic Performance Monitoring,” 270. 165 Alder and Tompkins, “Electronic Performance Monitoring,” 270-271. Cf., Jerald Greenberg,
“Organizational Justice: Yesterday, Today, and Tomorrow,” Journal of Management 16, no. 2 (1990): 399-
432.
A Person-Centered Managerial Paradigm for the Workplace
310
inventive part played by distributive and procedural justice in the organizational workplace in
relation to the surveillance framework. Many researchers, such as John Rawls who identifies justice
as “the first virtue of social institutions,”166 recognize the “importance of the ideal of justice as a
basic requirement for the effective functioning of organizations and the personal satisfaction of the
individuals they employ.”167 This means that the idea and practice of interpersonal relations and
social justice and fairness in the workplace leads employees both to understand who behaviours are
favorable and promising and to engage in these behaviours. Likewise, it is argued that procedural
justice judgments and evaluations consistently affect employee attitudes towards their work and their
organization by way of a transformed loyalty and commitment and increased work-group
cohesiveness.168 Researchers also propose that employee management should keep in mind the idea
of workplace justice in the design of employee programs and agendas, for instance in job analyses
and assessments or performance reviews and appraisals.169 This causes employees, in turn, to develop
self-identity and self-worth by valuing their relationships with other individuals and groups and with
the organization itself.170 These practices will eventually dispel the need for an external surveillance
system. Thus, the idea of organizational justice can be understood in parallel with the above-
mentioned organizational identification in the scope of labour valued management.
Within the framework of organizational justice, LVM likewise argues that the meaningfulness of
employees’ lives must be preserved in the organizational work context. Gorge Bragues, in his work,
Seek the Good Life, not Money, emphasizes business morality and tries to link it to a universal
concept of the good life, based on a reading of Aristotle.171 Though he notes that, from an Aristotelian
point of view, personal happiness consists in practicing of virtues, such as the intellectual virtues of
prudence manifested “in the leadership of organizations” and wisdom revealed “in the philosophical
search for truth,” Bragues argues that “the greatest ethical imperative for business is to give
individuals opportunities to thoughtfully participate in the management of company affairs and to
contemplate the ultimate meaning of things.”172 Bragues identifies seven moral virtues, out of a total
of 13 he discusses, that have a special role to play in business and which concur with reason:
“courage, self-control, generosity, magnificence, magnanimity, sociability, and justice.”173 Within
the scope and limits of this present research, we will adopt Bragues’ understanding of justice because
of the predominant role it has played in discussions about the meaningfulness of the lives of
employees and because of the relevance of its subject matter, which is freedom, privacy, property,
integrity, discrimination, power and status. For the practice Bragues identifies as leading to human
excellence in the workplace does involve justice. According to Bragues, any workplace morality and
meaningful life for employees will include:
166 John Rawls, A Theory of Justice (Cambridge, MA: Harvard University Press, [original edition], 1971), 3. 167 Greenberg, “Organizational Justice: Yesterday, Today, and Tomorrow,” 99. 168 Alder and Tompkins, “Electronic Performance Monitoring,” 271. Originally in, Edgar Allan Lind and Tom
R. Tyler, The Social Psychology of Procedural Justice (New York: Springer Science and Business Media,
1988), 179. 169 Alder and Tompkins, “Electronic Performance Monitoring,” 271. Cf., Gerald E. Fryxell and Michael E.
Gordon, “Workplace Justice and Job Satisfaction as Predictors of Satisfaction with Union and Management,”
Academy of Management Journal 32, no. 4 (1989): 863. 170 Alder and Tompkins, “Electronic Performance Monitoring,” 271. 171 George Bragues, “Seek the Good Life, Not Money: The Aristotelian Approach to Business Ethics,” Journal
of Business Ethics 67, no. 4 (2006): 341-357. 172 Bragues, “Seek the Good Life, Not Money: The Aristotelian Approach to Business Ethics,” 341. Priorities
of practicing the virtues are means to actualize the human potentials, that “[p]eople are thus called to display
courage, self-restraint, generosity, magnificence, magnanimity, sociability, justice, prudence, and wisdom in
their business activities,” to support a virtuous life. Bragues, “Seek the Good Life, Not Money: The
Aristotelian Approach to Business Ethics,” 342. 173 Bragues, “Seek the Good Life, Not Money: The Aristotelian Approach to Business Ethics,” 346.
A Person-Centered Managerial Paradigm for the Workplace
311
(1) the creation of more participatory workplaces so that employees can contribute their particular
expertise and play a greater role in company decisions; (2) less hierarchical structures and more
shared responsibilities in order to reduce the necessity of unreflective order taking and mind-
numbing specialization; (3) more respect shown for employee’s rationality by ensuring that
management liberally discloses information pertaining to the firm’s condition and prospects and
provides reasons for company policies; […].174
These frameworks of participatory workplace behaviours, shared responsibilities and due respect of
individual rationality, autonomy and dignity are key elements in LVM’s effort to create a better and
more productive workplace.
7.2.4 LVM and Rehumanizing Workplace
Finally, LVM stands for rehumanizing the workplace, where the human person is more valued than
anything else. The value of the human person can never be adequately practiced in the workplace
when employees are made the regular victims of unwarranted surveillance and mechanisms of
control through the vast implementation of advanced monitoring technologies. To rehumanize the
workplace means that one seeks to create a workplace where every individual is regarded as worthy
of respect intrinsically, without any discrimination or subordination. Stanley Been, in his article
‘Privacy, Freedom and Respect for Persons,’ writes:
[T]o conceive someone as a person is to see him as actually or potentially a chooser, as one
attempting to steer his own course through the world, adjusting his behaviour as his apperception
of the world changes, and correcting course as he perceives his errors. It is to understand that his
life is for him a kind of enterprise, like one’s own […]. To respect someone as a person is to
concede that one ought to take account of the way in which his enterprise might be affected by
one’s own decisions. By the principle of respect for persons, then, I mean the principle that every
human being, insofar as he is qualified as a person, is entitled to this minimal degree of
consideration.175
Since work is central to our life and a prerequisite for physical, psychological, emotional and social
survival, any dehumanizing experience in the context of work will produce in turn a discontent in
every realm of human life. Hence, it is necessary to seek a movement from dehumanizing situations
to more humane situations, in order to ensure that the dignity of each employee as a person is
esteemed and prized. Brene Brown sums up the essence of this idea of re-humanizing, saying that:
In an organizational culture where respect and the dignity of individuals are held as the highest
values, shame and blame don't work as management styles. There is no leading by fear. Empathy
is a valued asset, accountability is an expectation rather than an exception, and the primal human
need for belonging is not used as leverage and social control. We can't control the behaviour of
individuals; however, we can cultivate organizational cultures where behaviours are not tolerated,
and people are held accountable for protecting what matters most: human beings.176
174 Bragues, “Seek the Good Life, Not Money: The Aristotelian Approach to Business Ethics,” 354. 175 Stanley I. Benn, "Privacy, Freedom and Respect for Persons," in Philosophical Dimensions of Privacy: An
Anthology, ed. Ferdinand David Schoeman, 223-244 (Cambridge: Cambridge University Press, 1984), 229. 176 Brene Brown, “Three Ways to Kill Your Company’s Idea-Stifling Shame Culture,” FastCompany,
September 2012. http://www.fastcompany.com/3001239/3-ways-kill-your-companys-idea-stifling-shame-
culture [Accessed December 18, 2017].
A Person-Centered Managerial Paradigm for the Workplace
312
When a de-motivating situation, like that of continuous surveillance, ceases to exist, there emerges
a re-humanized177 and life-affirming workplace. Werhane speaks about each individual employee as
the ‘rightful owner’ of his or her personal and intimate information, and privacy protects the freedom
of each person to retain this ownership.178 This idea of rightful ‘ownership’ respects the personhood
of the employee, and if this personhood is individual, everyone has the right to protect him or herself
from invasions of any kind. For according to Werhane, disrespecting employee rights is equivalent
to disrespecting employees as persons,179 and thus she recommends a new approach to employment
issues.
Along with respect for the personal worth of every employee, a rehumanized workplace will
definitely make a difference in the employer-employee relationship. The reciprocal nature of the
employee-employer relationships in the workplace, according to Werhane, entails some important
employee rights, in particular rights to fair treatment and respect. If an employee is expected to “act
solely for the benefit of the principal [...] and not to act or speak disloyally,” the employer has a duty
to treat the employee with similar respect. Employer loyalty includes respect for employee privacy,
worker safety, employee information, and due process in the workplace.180 Respect for the employee
also entails minimizing workplace safety dangers and providing information about unavoidable
hazards. Expectations of loyalty and obedience are unjustified if one does not protect workers’
physical well-being.181 Thus, the respect and value given to individual employees will ensure that
they are treated as ends in themselves, not as the means to any end.
Johan Verstraeten enters this discussion by reasserting the value of the person in the workplace and
expressing that a person is more than just a “human resource.” He does this by drawing attention to
the elements of empowerment, integrity and participation.182 As a first step, he observes that any
business is “more than just a society of capital goods,” and conceives it as “a society and community
of persons in which people participate in different ways and with specific responsibilities, whether
they supply the necessary capital for the company’s activities or take part in such activities through
their labour.”183 Referring to the golden rule that “one should treat others as one would like to be
treated oneself,” as well as to the categorical imperative formulation that “one ought never to treat a
person as a mere means, but rather as an end in himself,” Verstraeten here underlines the need to
respect human dignity in workplace scenarios, which ensures the preservation of the fundamental
177 In the book ‘Business Ethics’ Andrew Crane and Dirk Matten also speak about re-humanized workplace,
but in a different way. They speak it in the context of mechanization of work which led to the situation of
unemployment. Also, the impact of technology, rationalized work processes and the division of labour have
made the work monotonous one bringing little meaning and satisfaction. Every job without job satisfaction
is a meaningless discourse where the relationship between technology and the quality of working life is less
maintained. Connecting these situations, they proposed the idea of re-humanized workplace. It is to re-
humanize the workplace by empowering the employee which include ‘job enlargement’ (giving employees a
wider range of tasks to do) and ‘job enrichment’ (giving employees a larger scope for deciding how to
organize their work). It is also to create a condition where workers can be engaged in more creative and
meaningful work utilizing ‘human-centred’ technology. Cf., Andrew Crane and Dirk Matten, Business Ethics:
Managing Corporate Citizenship and Sustainability in the Age of Globalization, 2nd ed. (Oxford: Oxford
University Press, 2007), 302. 178 Werhane, Persons, Rights, and Corporations, 118. 179 Werhane, Persons, Rights, and Corporations, 103. 180 Patricia H. Werhane, Tara J, Radin and Norman E. Bowie, Employment and Employee Rights (Oxford:
Blackwell, 2004), 112. 181 Werhane, Radin and Bowie, Employment and Employee Rights, 113. 182 Johan Verstraeten, “From Business Ethics to the Vocation of Business Leaders to Humanize the World of
Business,” A European Review 7, no. 2 (1998): 111. 183 Verstraeten, “From Business Ethics to the Vocation of Business Leaders,” 112.
A Person-Centered Managerial Paradigm for the Workplace
313
rights of employees.184 This also directs our discussion of LVM into different images of work
relationships, where the preferred option of LVM is very significant.
Brown, in this regard, speaks of four images: master-and-servant, market, team, and the entrepreneur.
The master-and-servant image is a legal precedent of labour management, where citizens become
mere servants, dominating the notion of obedience and exercisingtotal control or authority over
another person.185 According to Brown, “[b]eing a servant to a master was not just a contract; it was
an identity” in the early decades of twentieth century.186 It also carried the previously discussed
notion of “employment at will,” by appeal to which employers justified their refusal of due process
to their employees.187 The labour relationship in the market image relies exclusively on wages and
benefits, and thus the notion of “exchange” – an “exchange of one’s skills, talents and time for
wages” in a working situation.188 Though this promotes “equal exchange” and “acknowledges the
importance of fair dealing,” it turns workers into “commodities that can be traded.”189 Likewise,
though the market image also introduces the law of reciprocity based on fair exchanges and
cooperation and reveals the social bonds that develop relationships, “it does not signify the implicit
cooperation on which it [market image] depends.”190 Thus the need for cooperation is seen in the
image of team relationships, which express a relationship of cooperation by employee participation
in order to develop a common vision and common problem solving strategies.191 The need for
cooperation and reciprocity is much appreciated in this image.
The teamwork image focuses, along with personal development, on the goal achievement of an
organization through mutual participation, and thus the organization becomes a “learning team” as
its members engage in dialogue with each other to build up the organization.192 The teamwork image,
given its inherent dimension of mutual participation and interpersonal exchange, argues for a
cooperative and reciprocal workplace. The fourth image, that of the entrepreneur, appeals to the role
of an initiator, with new ideas for developing the organization and the economy at large.193 Since it
highlights the role played by individual creativity, cooperation, reciprocity and the aspect of working
together is less emphasized in this model. Though each of these images provides a foundation,
implicitly or explicitly, for creating and maintaining workplace relationships, LVM affirms the team
184 Verstraeten, “From Business Ethics to the Vocation of Business Leaders,” 114. 185 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 77. As Brown rightly states
when workers received by law their rights to organize and to engage in collective bargaining, they are being
treated again as citizens. 186 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 77. 187 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 78. In many places, along
with the law of employment at will, there is law against racial or other discrimination. But there are other
images like market image placed alongside the master-servant image. 188 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 79. 189 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 83. 190 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 79-80. According to Brown,
the different self-interests played in this relationship will become conflicting interests in the workplace that
leads again to ego-centric actions and behaviours in a relationship. 191 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 80. 192 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 80-81. It fosters an
interpersonal encounter among co-workers to a joint effort to make the future of the organization. Th image
of reciprocal relationship functions here. 193 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 81. Brown referring to
Charles Spinosa, Fernando Flores, and Hubert Dreyfus, brings here three distinct characteristics of
entrepreneurs: (1) self-appointed entrepreneurs driven by greed and ego; (2) persons involved in democratic
action; and (3) cultural figures, who create solidarity around a common concern. Cf. Charles Spinosa,
Fernando Flores and Hubert Dreyfus, Disclosing New Worlds: Entrepreneurship, Democratic Action, and the
Cultivation of Solidarity (Cambridge, MA and London: MIT Press, 1997); Brown, Corporate Integrity:
Rethinking Organizational Ethics and Leadership, 81.
A Person-Centered Managerial Paradigm for the Workplace
314
image, since it makes possible a more cooperative conversation and more participative mode of
interactive relationships in the workplace, even leading to dialogue-focused mutual learning and thus
the development of the organization. According to Brown, “[p]erformance reviews based on this
[teamwork] image would encourage the supervisor and subordinate to work together to develop
mutual expectations for future performance.”194 Employees here seek ways to further improve their
mutual interaction and cooperation with authorities in order to sustain team performance and ensure
the constant development of the organization.
7.3 SELF-MONITORING [SELF-REGULATION] AS A HUMAN DEVELOPMENT ALTERNATIVE
In line with the major surveillance literature and other qualitative and quantitative studies on the
same theme, this research holds that electronic surveillance in the organizational workplace
detrimentally affects employees’ life chances – including work-life/culture, productivity, job
satisfaction, creativity and motivation by its individual (invasion of privacy, health hazards like
stress) and social impacts (social sorting, power distance and control). These detriments outweigh its
benefits. Electronic surveillance is, therefore, an inadequate way to manage employees. An
alternative to electronic surveillance is needed in the workplace. Ball reminds us of this need,
pointing out that:
(1) If no alternative can be found, managerial attention to task design, supervisory processes,
employees’ expectations about monitoring, and an appraisal of the company’s operating
environment can mediate its downsides; (2) the normality of workplace surveillance, and the
prevalence of arguments about how to ‘do it better’, make it difficult to radicalize; and (3) the
introduction of broader debates around information use, rights, power and social structure
highlights how surveillance in the workplace may serve to perpetuate existing inequalities and
create new ones.195
What then is required in the workplace? Employee management processes and styles need to be
redesigned, Ball rightly observes, to limit or balance their emphasis on external monitoring.196 West
and Bowman rightly observe that “[i]n the pursuit of work-life balance, respect for the moral agency
of a person can serve to mitigate the asymmetry in employer-employee relations.”197 Central to this
understanding of human moral agency is the view that each person has the capacity to exercise
personal autonomy, or a capacity for self-government.198 Rooksby and Cica, referring to Joel
Feinberg, state that individuals experience a sense of violation, invasion, or belittlement when they
are not allowed to govern themselves.199 Electronic surveillance and the consequent domination of
others over individual employees has just this effect, and creates doubts in employees’ about their
own capacity to govern themselves. This personal moral autonomy is also the basis on which any
citizen can claim his or her individual, socio-economic and cultural rights, which in turn transform
the “social and institutional means necessary for individuals to exercise their autonomy, and include
the freedom of conscience, expression, and association”200 in the workplace. Personal autonomy is
thus accorded significant scope in this research.
194 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 83. 195 Ball, “Workplace Surveillance: An Overview,” 87. 196 Ball, “Workplace Surveillance: An Overview,” 94. 197 West and James S. Bowman, “Electronic Surveillance at Work: An Ethical Analysis,” 640. 198 Rooksby and Cica, “Personal Autonomy and Electronic Surveillance in the workplace,” 244. 199 Rooksby and Cica, “Personal Autonomy and Electronic Surveillance in the workplace,” 244. Cf. Joel
Feinberg, “Autonomy,” in The Inner Citadel: Essays on Individual Autonomy, ed. John Christman (Vermont:
Echo Point Books (New York and Oxford: Oxford University Press, 1989) 2014, 27-53. 200 Rooksby and Cica, “Personal Autonomy and Electronic Surveillance in the workplace,” 244.
A Person-Centered Managerial Paradigm for the Workplace
315
Rooksby and Cica identify two sorts of conditions that an agent must meet to count as an autonomous
agent: he or she must “satisfy certain competency conditions,” and must “satisfy certain authenticity
conditions.”201 They also note that, referring to an incomplete list of competency conditions
developed by Diana Meyers, securing these conditions requires introspective, imaginative,
communicative, analytical, reasoning, volitional and interpersonal skills. As for the authenticity
conditions, agents must act based on “certain values that are, in some sense, his or her own, rather
than resulting from the manipulation of others, form addiction, or from lack of self-control.”202 When
an employee arrives at his or her values in an appropriate way – free from external force and undue
manipulation, he or she can act in an authentic way to the benefit of the organization. In the same
way, any external intervention, such as external monitoring, reduces or distorts employee’s personal
autonomy and fails to satisfy the authenticity condition or to affirm or even recognize and
individual’s capacity for autonomy. Similarly, the moral value of personal autonomy and the
consequent rights of employees to assess and pursue them in a workplace context should be without
manipulative inference from the employer or indeed any external authority. In this regard, we would
again propose the desirability of self-monitoring over against highly manipulative electronic
(external) monitoring. Self-monitoring, in the scope of this research, could take the form of a
conscious personal management system that helps employees control what they think, say and do
and thus transforms all behaviours for overall benefit of all in the organization, employees and
employers alike.
Through analysis of the results of the empirical study conducted as part of this research, based on the
employees in IT, ITeS and BPOs in India, the fifth chapter of this research found that a majority of
respondents prefers self-monitoring (75.4%). Besides, it is notable that among the rest of
respondents, along with those who argued for ‘no electronic monitoring,’ a few of those who claimed
the need of electronic monitoring also prefer self-monitoring as the next best option. As previously
discussed, self-monitoring, in the context of the organizational workplace, means the capacity of
individual employees to adjust his or her behaviours according to various external or situational
factors, each in tune with his or her own personal and moral values and attitudes. Self-monitoring
invariably leads to better performance ratings and increased productivity. The concept of self-
monitoring is introduced by Mark Snyder203 and treated as a social construct of expressive behaviour.
It relies on employees’ personality traits and individual ability to regulate or control their own
behaviour. Here, in this study, the concept of self-monitoring is differentiated from the concept of
impression management. According to Stanton, self-monitoring, being a stronger and better
motivator than external surveillance, is ten times more effective in increasing efficiency and
productivity.204 Research on employees’ preference for self-monitoring and how it improves
employee performance have already been discussed in the fifth chapter.
The concept of Behavioural Self-Monitoring (BSM) is being researched by several psychologists
and physicians, as we have noted, who ask their patients to observe, evaluate and record their own
201 Rooksby and Cica, “Personal Autonomy and Electronic Surveillance in the workplace,” 245. 202 Rooksby and Cica, “Personal Autonomy and Electronic Surveillance in the workplace,” 245. Cf. Diana T.
Meyers, “Intersectional Identity and the Authentic self: Opposites attract!” in Relational Autonomy: Feminist
Perspectives on Autonomy, Agency and the Social Self, eds. Catriona A. Mackenzie and Natalie Stoljar (New
York: Oxford University Press, 2000), 151-180. 203 Mark Snyder, “Self-Monitoring of Expressive Behaviour,” Journal of Personality and Social Psychology
30, no. 4 (1974): 526-537. 204 Jeffrey M. Stanton, “Reactions to Employee Performance Monitoring: Framework, Review, and Research
Directions,” Human Performance 13, no. 1 (2000): 93.
A Person-Centered Managerial Paradigm for the Workplace
316
behavioural tendencies for the purpose of treatment.205 In the workplace, such a practice enhances
self-regulatory processes and thus improves productivity, safety and health. Self-monitoring, when
targeted toward one’s job responsibilities, increases productivity and enhances workplaces
relationships. It also has motivational effects, as it identifies stressors, hazards or harmful behaviours
in the workplace. Self-monitoring of one’s own productivity or safety behaviors, according to Ryan
Olson and Jamey Wichester, “may reveal motivating discrepancies […] between current and goal
levels of behavior, or when goals are met, the data may function as conditioned reinforcers.”206
Researchers such as Jeffrey M. Stanton have also the significant gains in performance secured by
self-monitoring.207 However, the workplace applications of BSM have not received enough attention
in scholarship. There is also a danger that as electronic surveillance becomes even more ubiquitous,
the above mentioned BSM procedures may also be manipulated as a “management method for
‘checking up on’ or ‘spying on’ workers.”208 Therefore, self-monitoring as a feasible strategic
approach to employee management is recommended as a subject for further research.
Though self-monitoring in the workplace is regarded as dependent upon employees’ personality traits
and capacity to control their own expressive behaviours – by monitoring and controlling their self-
presentation - it also includes a concern for one’s social ties and status in the organization. As Joel
H. Neuman and Robert A. Baron state, employees who monitor or control themselves score high in
social sensitivity and in producing self- and other-favourable behaviours due to their awareness of
others reactions to a situation as well as their ability to adjust their actions to changing conditions.209
In the organizational workplace, employees with high self-monitoring “would be more conciliatory
in conflict situations and less provocative in their behaviour towards others.”210 It has also been found
that self-monitoring “predict[s] one’s position within a workplace social network, and […] self-
monitors appear to actively participate in the construction of their social worlds at work.”211 Self-
monitoring could be expressed in this way, as “an individual level variable that has been shown to
have a pervasive influence on behavioural choices in both social interactions and interpersonal
relationships.”212 This means that employees with self-monitoring and self-regulative traits are said
to express valuable characteristics in relationships with other workers and with management and thus
increase the workflow.
Therefore, in line with Snyder, who defines self-monitoring as “differences in the extent to which
people monitor (observe, regulate, and control) the public appearances of self they display in social
situations and interpersonal relationships,”213 this research defines self-monitoring in the workplace
205 Ryan Olson and Jamey Winchester, “Behavioral Self-Monitoring of Safety and Productivity in the
Workplace: A Methodological Primer and Quantitative Literature Review,” Journal of Organizational
Behavior Management 28, no. 1 (2008): 9-75. 206 Olson and Winchester, “Behavioral Self-Monitoring of Safety and Productivity in the Workplace,” 14. 207 Stanton, “Reactions to Employee Performance Monitoring,” 85-113. 208 Olson and Winchester, “Behavioral Self-Monitoring of Safety and Productivity in the Workplace,” 16. 209 Joel H. Neuman and Robert A. Baron, “Workplace Violence and Workplace Aggression: Evidence
Concerning Specific Forms, Potential Causes, and Preferred Targets,” Journal of Management 24, no. 3
(1998): 405. 210 Neuman and Baron, “Workplace Violence and Workplace Aggression,” 405. 211 Sonya Fontenot Premeaux and Arthur G. Bedeian, “Breaking the Silence: The Moderating Effects of Self-
Monitoring in Predicting Speaking Up in the Workplace,” Journal of Management Studies 40, no. 6 (2003):
1539. Cf. Ajay Mehra, Martin Kilduff and Daniel J. Brass, “The Social Networks of High and Low Self-
Monitors: Implications for Workplace Performance,” Administrative Science Quarterly 46, no. 1 (2001): 121-
146. 212 Premeaux and Bedeian, “Breaking the Silence: The Moderating Effects of Self-Monitoring in Predicting
Speaking Up in the Workplace,” 1540. 213 Mark Snyder, Public Appearances, Private Realities: The Psychology of Self-Monitoring (New York: W H
Freeman/Times Books/ Hemy Holt & Co, 1987), 4. As Snyder observes there is high self-monitors as well as
A Person-Centered Managerial Paradigm for the Workplace
317
as a capacity for behavioural appropriateness through self-observation, self-control and self-
presentation. It is a general personality characteristic of work-related attitudes and behaviours. The
creation and maintenance of workplace relationships are significant and include the self-monitoring
traits of employees. David V. Day and Deidra J. Schleicher, in this regard, state that:
[O]rganizational work is characterized by exercises of power and authority, enacted and perceived
leadership, job performance and performance assessment, attitude formation and expression, and,
most important, relationships. […] All of these phenomena—and especially work relationships—
influence and are influenced by the expressive control of individuals engaged in social interaction.
[…] Self-monitoring personality is an important construct in understanding how such
relationships are formed and maintained.214
By means of these effective work relationships, the goals and objectives of an organization are
accomplished. An empirical study by Day and Schleicher explores the relationships between self-
monitoring and other work-related constructs such as “job attitudes (including organizational
commitment, job satisfaction, job involvement, and role stressors), individual ability, job
performance and advancement, and leadership.”215 In the same way, they state, referring to Day et
al., that “high self-monitors (in comparison to low self-monitors) tend to be more involved in their
jobs, have higher levels of cognitive ability, perform at a higher level, are rated as better managers,
and are more likely to emerge as leaders.”216 Likewise, through self-monitoring, employees
contribute to the vision and mission of the organization.
Here in the final stage of our research, this section on self-monitoring also concerns individual moral
behaviour, in that it calls for a rethinking of how individuals make sense of things in a given context.
Moral behaviour is said to be the response of an individual to a situation, with respect to how he or
she makes sense of it by reference to the moral directives he or she is expected to possess and
produce. For many business ethicists assume that “an individual can gain a completely objective,
rational understanding of what is morally required of him/her in particular situations.”217 Referring
to Norman Bowie’s description of being rational as essential to moral agency, Painter-Morland
points out that he also emphasizes deliberate rational analysis because reason characterises humanity,
and thus views it as an approach to ethical decision-making.218 Those who hold this view also expect
that responsible moral agents will avoid the undue influence of subjectivity and personal perceptions
to secure a desired outcome, as these may carry emotional content or bias. Such agents transcend the
contextual pressures of the situations in which they find themselves.219 However, for some others,
“moral values are a direct product of the human relations that we are immersed in.”220 Appreciating
the “non-instrumental meaning and significance of individual lives,” and recognizing the “concrete
particularity of an individual’s existence,” Painter-Morland argues that a true and authentic moral
response can emerge only from a “rootedness of human beings in everyday practice,” and the
“possibility of morality lies […] in his/her readiness to recognize and respond to such realities as
low self-monitors distinguished by various dimensions like motivation, ability, attention to different signs
and situational cues, appropriate use of ability and even consistent behavioural patterns. 214 David V. Day and Deidra J. Schleicher, “Self-Monitoring at Work: A Motive-Based Perspective,” Journal
of Personality 74, no. 3 (2006): 689. 215 Day and Schleicher, “Self-Monitoring at Work: A Motive-Based Perspective,” 690. 216 Day and Schleicher, “Self-Monitoring at Work: A Motive-Based Perspective,” 695. Cf. David V. Day,
Derida J. Schleicher, Amy L. Unckless, and Nathan J. Hiller, “Self-Monitoring Personality at Work: A Meta-
Analytic Investigation of Construct Validity,” Journal of Applied Psychology 87, no. 2 (2002): 390–401. 217 Painter-Morland, Business Ethics as Practice, 97. 218 Norman Bowie, Business Ethics: A Kantian Perspective (Malden: Blackwell, 1999), 45; Painter-Morland,
Business Ethics as Practice, 97. 219 Painter-Morland, Business Ethics as Practice, 97. 220 Painter-Morland, Business Ethics as Practice, 98.
A Person-Centered Managerial Paradigm for the Workplace
318
they become manifest in the course of everyday life.”221 All these facts and specifics influence the
ability of an individual to act as moral agent.
Painter-Morland’s question of “whether a system of authority and oversight based on generalized
normative imperatives really is the best way to ensure that employees come into their own as moral
agents”222 is very pertinent to our discussion here. The individual’s autonomous thinking about moral
norms, and understanding of the anthropological dimension (of dignity, autonomy and sociability) is
a highly valued component of these responsibly self-regulated practices. The structures and concepts
that have been developed to understand reality may actually inhibit the ability of individuals to act
as moral agents.223 Likewise, adopting an organization’s standard solutions to fix a unique moral
problem will likely not yield an authentic solution in a specific context and time. In what follows,
we consider why the notion of self-regulation is an inevitable part of responsible workplace
behaviour.
The “self-regulatory approach”224 accords great value to human rights and justice in given situations
like the organizational workplace. Generally, on an individual level, self-regulation is viewed as the
regulation by a person of his or her own behaviour without any external control or monitoring. It is
defined as “the process by which people change thoughts, feelings, or actions in order to satisfy
personal and society goals and standards.”225 It could be placing self-control over internal attitudes
and external behaviours to bring about an individually or socially desirable behaviour. In other
words, it is an alteration of the inner state and responses of an individual.226 It is held to be a self-
management mechanism in an organizational context. In a workplace context, the four components
of self-regulation or self-management identified by Roy Baumeister are important, as they begin with
the standards of desirable behaviour expected in the workplace, followed by the motivation to meet
the given standards. It then looks for monitoring of thoughts and other situations that may violate
these standards, and concludes by considering the willpower or internal strength needed to control
the inner and outer urges of human behaviour.227 So, in a nutshell: the components of self-regulation
are standards, motivation, monitoring and willpower.228 These can be applied in different situations,
221 Painter-Morland, Business Ethics as Practice, 99. 222 Painter-Morland, Business Ethics as Practice, 101. 223 Painter-Morland, Business Ethics as Practice, 101. 224 Mark C. Bolino, Jaron Harvey and Daniel G. Bachrach, “A Self-Regulation Approach to Understanding
Citizenship Behaviour in Organizations,” Organizational Behaviour and Human Decision Process 119
(2012): 126-139; Tom R. Tyler, “Self-Regulatory Approaches to White-Collar Crime: The Importance of
Legitimacy and Procedural Justice,” in The Criminology of White-Collar Crime, eds. Sally S. Simpson and
David Weisburd (New York, NY: Springer, 2009), 195-216; Tom R. Tyler, “Legitimacy and Criminal
Justice: The Benefits of Self-Regulation,” Ohio State Journal of Criminal Law 7 (2009): 307-359. 225 Todd F. Heatherton, “Neuroscience of Self and Self-Regulation,” Annual Review of Psychology 62, no. 1
(2011): 364. Todd F. Heatherton, in this article, illustrates few psychological components characterizing self-
regulation that it, firstly, requires individual awareness of one’s own behaviour, which has to be measured
against societal norms and that follows an understanding of how others react to his or her behaviour. It will
then try to detect threats and intimidations in complex social situations leading, finally, to look for further
mechanism to resolve inconsistencies and incongruences arising in the relation of self-knowledge to social
expectations of norms. In this way it tries to resolve existing and possible conflicts with a motivated
behaviour. Cf., Heatherton, “Neuroscience of Self and Self-Regulation,” 363-380. 226 Roy F. Baumeister, Brandon J. Schmeichel and Kathleen D. Vohs, “Self-Regulation and the Executive
Function: The Self as Controlling Agent,” in Social Psychology: Handbook of Basic Principles, eds. A. W.
Kruglanski and E. T. Higgins (New York: Guilford Press, 2007), 516-539. 227 Baumeister, Schmeichel and Vohs, “Self-Regulation and the Executive Function,” 516-539; Mark Muraven
and Roy F. Maumeister, “Self-Regulation and Depletion of Limited Resources: Does Self-Control Resemble
a Muscle?” Psychological Bulletin 126, no. 2 (2000): 247-259. 228 Roy F. Baumeister, Kathaleen D. Vohs and Dianne M. Tice, “The Strength Model of Self-Control,” Current
Directions in Psychological Science 16, no. 6 (2007): 351-355.
A Person-Centered Managerial Paradigm for the Workplace
319
including in relation to workplace behaviours and life chances. Albert Bandura, in a similar manner
in a study of self-regulation, proposes that the characteristics of self-observation, self-evaluation and
self-efficacy all interact within the process of attaining a goal – which is a motivation – that has been
previously set.229 All these concern the perception of self-control in human behaviour.
Tom R. Tyler also proposes a self-regulation approach able to trigger employees’ ethical
judgements.230 Regarding employee regulation, Tyler compares the command-and-control approach
with the self-regulatory approach. In his view, the former fosters a rule-following method and
emphasizes the instrumental concerns of employees – namely, utility maximization. This reflects a
strategy of external regulation. The latter, by contrast, signifies the internal motivations of
agents/employees, which is linked to identification and internalization.231 The concept of command-
and-control emphasizes the active role of the external authority and the use of extrinsic force to
demand adherence to rules. Tyler argues that in the modern workplace there are several features
resulting from the command and control model. For instance, he states that “the extensive use of
surveillance techniques – such as the use of cameras, the monitoring of telephone calls and computer
usage, etc. – is an artefact of the implementation of command-and-control techniques.”232 So, there
are both financial and social costs associated with this approach.
In motivating employee rule following, the self-regulatory model emphasizes the role played by an
individual’s ethical values, which are related to or interact with the organization. It holds that
concerns about the legitimacy of organizational authorities and rules, and the congruence of the same
with the individual’s moral values, leads one to feel a personal responsibility to adhere to corporate
rules and policies.233 For, as Tyler rightly observes, employees are “motivated to align their behaviour
with the rules of organizations or groups they belong to when they view those groups as being
legitimate and consistent with their own sense of right and wrong.”234 So, when the ethical values of
individual employees are activated, adherence to laws and policies is also tremendously increased.
This speaks about an intrinsic motivation through an employee’s ethical values to follow the rules
and regulations of organizations. It goes beyond the extrinsic incentives or sanctions specified by the
organization and emphasizes the ethical values of individual employees. This means that the ethical
concerns of an employee motivate his or her self-regulatory behaviour. Even when we consider the
viability and utility of self-regulatory strategies, we find that they are of greater benefit to the
organization that any command-and-control strategy. For according to Tyler, the self-regulatory
strategy “prevents organizations from expending resources on creating and maintaining credible
systems of surveillance to enforce rules, strategies actually encourage people to hide their behaviour
and thus make it necessary to have especially comprehensive and costly surveillance systems.”235
229 Albert Bandura, “Social Cognitive Theory of Self-Regulation,” Organizational Behaviour and Human
Decision Process 50 (1991): 248-287. 230 Tyler, “Self-Regulatory Approaches to White-Collar Crime,” 195-216. Tyler applies the notion of self-
regulation to the different domains of human life, such as law, criminal justice, etc., and focuses on the
individual values consisting a “voluntary compliance with law and/or willing cooperation with legal
authorities.” Tom R. Tyler, “Legitimacy and Criminal Justice: The Benefits of Self-Regulation,” Ohio State
Journal of Criminal Law 7 (2009): 307. 231 Tyler, “Self-Regulatory Approaches to White-Collar Crime,” 197. 232 Tyler, “Self-Regulatory Approaches to White-Collar Crime,” 200. 233 Tyler, “Self-Regulatory Approaches to White-Collar Crime,” 197. Cf. Taylor, “Legitimacy and Criminal
Justice: The Benefits of Self-Regulation,” 312. 234 Tyler, “Self-Regulatory Approaches to White-Collar Crime,” 197. When Tyler addresses self-regulatory
approach, he explores how values shape law-related behaviours and how then to engage the legitimacy of that
law. In an organizational level, employees are more likely to obey a law when he or she perceive it legitimate
and consistent with their values. How a legal authority exercises its power is also significant in this self-
regulatory model. Taylor, “Legitimacy and Criminal Justice: The Benefits of Self-Regulation,” 315. 235 Tyler, “Self-Regulatory Approaches to White-Collar Crime,” 204.
A Person-Centered Managerial Paradigm for the Workplace
320
When individual employees, through the use of self-regulatory strategies, take responsibility for
themselves, follow the rules, and commit themselves to the organizational goals, organizations grow
and develop.
The self-regulatory model functions by increasing the level of ethical values and responsibility that
an employee shows. At the same time, as Tyler states, it is important to observe how employees hold
these ethical values that fosters their adherence to the rules. Tyler here introduces the idea that
procedural justice, upheld by fair organizations, can activate the ethical values of employees. This is
done on the assumption of the group engagement model, that “procedural justice judgements are
central to shaping employee cooperative behaviour.”236 The above-mentioned ethical values are
responsibly created and shaped by the perception that employees are fairly treated by management
and by the organization. Tyler suggests in this regard that “an organizational environment
characterized by fair procedures will activate strong employee organizational identification, thus
leading them to engage in desirable workplace behaviours and to hold positive attitudes toward their
work organizations.”237 Organizational culture, with its policies and practices, influences the ethical
values of employees and consequently their ethical attitudes and behaviours. Thus, Tyler argues that
the aspects of equity and distributive justice in the organization shouls focus on distributive fairness,
which will both intrinsically and instrumentally motivate employees.238 Procedural justice
evaluations and judgements go beyond instrumental concerns and look for procedures that respect
employees’ relational connections and social identities.
Fair procedures in an organization help both employers and employes to understand the moral values
possessed both by the organization and by its individual members. According to Tyler, this notion of
fair procedures “activates employee’s own internal motivations, and they more voluntarily follow
company rules and policies, i.e., they become self-regulatory.”239 Employees who feel and
experience a fair work environment will willingly assume responsibility to follow the policies and
rules without any external compulsion or control.240 Fair treatment by management fosters desirable
employee behaviours that benefit the organization. Tyler observes that unfair behaviour by
employers motivates employees to engage in fraudulent activities, such as theft or sabotage.241 This
introduces the idea of employee management through fairness, including an ethical motivation to
follow group policies and rules. This is linked in turn to ethical and fair behaviours in the
organizational workplace. This understanding of rule following and morally enabled ethical
behaviour goes well with the concept of human motivation, which we have explored in considering
236 Tyler, “Self-Regulatory Approaches to White-Collar Crime,” 198. This view is supported by researchers
from both legal and managerial settings. Cf. Tom R. Tyler, Why People Obey the Law: Procedural Justice,
Legitimacy, and Compliance (Princeton, NJ: Princeton University Press, 2006); Tom R. Tyler and Steven L.
Blader, “Can Business Effectively Regulate Employee Conduct? The Antecedents of Rule Following in Work
settings,” Academy of Management Journal 48, no. 6 (2005): 1143-1158; and Tom R. Tyler and Steven L.
Blader, “The Group Engagement Model: Procedural Justice, Social Identity, and Cooperative Behaviour,”
Personality and Social Psychology Review 7, no. 4 (2003): 349-361. 237 Tyler, “Self-Regulatory Approaches to White-Collar Crime,” 206. Taylor, “Legitimacy and Criminal
Justice: The Benefits of Self-Regulation,” 319-320. 238 Tyler, “Self-Regulatory Approaches to White-Collar Crime,” 206. Cf. Edgar Allan Lind and Tom R. Tyler,
The Social Psychology of Procedural Justice (New York: Plenum, 1988). 239 Tyler, “Self-Regulatory Approaches to White-Collar Crime,” 207. Cf., Tom R. Tyler, Lawrence Sherman,
Heather Strang, Geoffrey C. Barnes, and Daniel Woods, “Reintegrative Shaming, Procedural Justice, and
Recidivism: The Engagement of Offenders' Psychological Mechanisms in the Canberra RISE Drinking-and-
Driving Experiment,” Law and Society Review 41, 3 (2007): 553-586. 240 Tyler, “Self-Regulatory Approaches to White-Collar Crime,” 207-208. 241 Tyler, “Self-Regulatory Approaches to White-Collar Crime,” 208. Cf. Tom R Tyler. and Steven L. Blader,
Cooperation in Groups: Procedural Justice, Social Identity, and Behavioural Engagement (Philadelphia, PA:
Psychology Press, 2000).
A Person-Centered Managerial Paradigm for the Workplace
321
the employee valued or labour valued management model discussed in the previous section. We can
now see how human motivations and ethical motivations can complement one another, constructively
altering employee behaviour. Further aspects of this self-regulatory approach are explored below.
7.3.1 Authentic Self-Direction, Creating Capabilities and Self-Monitoring
Firstly, the notion of “authentic self-direction” substantiates the argument of responsible self-
regulation with well-researched academic and reflective thoughts. Ideas about self-direction and
self-regulation enable employees to act ethically within the workplace without compulsion from
external control systems like electronic monitoring and surveillance systems. To substantiate this
idea, we will here consider Amartya Sen’s contribution to notions of human rights and shared
humanity by analysing his idea of authentic self-direction. The capability approach, developed by
Amartya Sen, perceives human life as a set of “doings and beings,” otherwise called “functionings,”
and “relates the evaluation of the quality of life to the assessment of the capability to function.”242
Sen defines this concept of functionings as “parts of the state of a person – in particular the various
things that he or she manages to do or be in leading a life.”243 These are the things, according to Sen,
that a person values “doing or being,” or things “he or she has reason to value.”244 It enables
individuals to decide which functionings are valuable to him or her in a given situation. This
capability, in an organizational context, prioritizes the individual employee’s functionings that are
self-valuable as well as valuable for the organization. The capability approach focuses on actual
human life, proposing “a serious departure from concentrating on the means of living to the actual
opportunities of living.”245 This view clearly runs contrary to a means-oriented evaluative approaches
in moral decisionmaking.
According to Sen, individuals enhance their well-being by expanding their capabilities through the
exercise of their freedom of choice.246 For the idea of freedom, in this regard, “respects our being
free to determine what we want, what we value and ultimately what we decide to choose.”247 He
distinguishes between the “well-being” aspect and the “agency aspect” of persons. Apart from John
Rawls’s analysis of “Kantian constructivism,” according to which “persons [are] characterized as
rational agents of construction,” Sen argues that “the conception of ‘persons’ in moral analysis cannot
be so reduced as to attach no intrinsic importance to this agency role, seeing them ultimately only in
terms of their well-being.”248 For Sen, the person’s own life, with the concepts of autonomy and
personal liberty, are important to his or her agency role, because “[f]or an integrated person it is
likely – possibly even inevitable – that the person’s well-being will be influenced by his or her
242 Amartya Sen. “Development as Capability Expansion,” in Readings in Human Development: Concepts,
Measures and Policies for a Development Paradigm, eds. Sakiko Fukuda-Parr and A.K. Shiva Kumar (New
Delhi and New York: Oxford University Press, 2003), 43. 243 Amartya Sen, “Capability and Well-being,” in The Quality of Life, eds. Martha C. Nussbaum and Amartya
Sen (Oxford: Clarendon, 1993), 31; Amartya Sen, Development as Freedom (Oxford: Oxford University
Press, 1999), 75. 244 Sen, The Idea of Justice, 231. The criticism levelled against the capability approach that it being
‘methodological individualism,’ that “all social phenomena must be accounted for in terms of what
individuals think, choose and do,” Sen states that “[t]here have certainly schools of thought based on
individual thought, choice and action, detached from the society in which they exist. But the capability
approach not only does not assume such detachment, its concern with people’s ability to live that kind of lives
they have reason to value brings in social influences both in terms of what they value […] and what influences
operate on their values […].” Sen, The Idea of Justice, 244. 245 Sen, The Idea of Justice, 233. 246 Amartya Sen, “Well-being, Agency and Freedom: The Dewey Lectures 1984,” The Journal of Philosophy
82, no. 4 (1985): 169. Cf., Amartya Sen, The Idea of Justice (London: Penguin Books, 2009), 225-290. 247 Sen, The Idea of Justice, 232. 248 Sen, “Well-being, Agency and Freedom: The Dewey Lectures 1984,” 186.
A Person-Centered Managerial Paradigm for the Workplace
322
agency.”249 However, Sen also points to the possibility that a single person will have several agency
roles, such as those connected to fulfilling obligations, and that this may adversely affect individual
well-being.250 Well-being is nothing external for Sen, but rather is achieved internally in oneself with
a distinctly personal quality. Sen’s focus is indeed on the individual’s capability to function rather
than on actual functionings. Sen argues that “the well-being aspect of a person leads to a particular
concept of freedom, which has been called well-being freedom.”251 Thus, the well-being aspect of a
person is linked to his or her capability to function, rather than any specific functioning vector, and
includes the freedom that a person possesses to do or to be.
Along with the understanding of freedom based on the well-being aspect of a person, Sen’s
interpretation of freedom, based on the agency aspect of a person, is significant for our purpose here.
According to Sen, “[a] person’s ‘agency freedom’ refers to what the person is free to do and achieve
in pursuit of whatever goals or values he or she regards as important […] taking note of his or her
aims, objectives, allegiances, obligations, and – in a broad sense – the person’s conception of the
good.”252 Both the agency freedom “to achieve whatever the person, as a responsible agent, decides
he or she should achieve,” and the well-being freedom that tries to “achieve something in particular,
viz., well-being,”253 is important and has special role to play in one’s moral decisionmaking. For the
“use of one’s agency is […] a matter for oneself to judge.”254 Sen also speaks about two elements of
freedom – power and control – required to achieve a chosen result, depending on whether one’s
choice will be respected in order that a corresponding result may happen. This power he calls effective
power, and it does not concern the procedures of control, while freedom itself exercises control over
procedures and the process of choice.255 The individual is obliged not to interfere with other people’s
freedom, because, on the one hand, the “concentration on control tends to produce an unacceptably
narrow conceptualization of liberty and freedom,” and on the other, individual freedom is “assessed
whether the person is himself exercising control over the process of choice.”256 However, certain
mechanisms of self-decision making and procedures of self-choice demand a capacity to exercise
self-directed control over situations.
In order to have a sustainable moral system in one’s behaviours, one must recognize certain rights-
related constraints in line with human freedom. For human rights are also linked to capabilities, and
both rights and capabilities depend on the process of public reasoning toward a moral judgement.257
This freedom also involves authentic self-direction, which is perceived as an ability to shape the
destiny of an individual both as a person and as a part of various communities. Shalom Schwartz
identifies self-direction as a universal human value, as it, for him, represents independent thought
and action – choosing, creating, and exploring.258 Though the value dimension of self-direction
possesses both intrinsic and instrumental value, Schwartz links self-direction to the autonomy of the
individual and thus as a value motivating human action through the scales of freedom (action and
thought), creativity (uniqueness, imagination), independence (self-reliance, self-sufficiency),
249 Sen, “Well-being, Agency and Freedom: The Dewey Lectures 1984,” 187. 250 Sen, “Well-being, Agency and Freedom: The Dewey Lectures 1984,” 187. Sen also analyse the individual
well-being with utility, which has different interpretations like happiness, desire, and choice. 251 Sen, “Well-being, Agency and Freedom: The Dewey Lectures 1984,” 203. 252 Sen, “Well-being, Agency and Freedom: The Dewey Lectures 1984,” 203. 253 Sen, “Well-being, Agency and Freedom: The Dewey Lectures 1984,” 203-204. 254 Sen, “Well-being, Agency and Freedom: The Dewey Lectures 1984,” 204. 255 Sen, “Well-being, Agency and Freedom: The Dewey Lectures 1984,” 208. 256 Sen, “Well-being, Agency and Freedom: The Dewey Lectures 1984,” 209. 257 Amartya Sen, “Human Rights and Capabilities,” Journal of Human Development 6, no. 2 (2005): 151-166. 258 Shalom H. Schwartz, “Universals in the Content and Structure of Values: Theoretical Advances and
Empirical Tests in 20 Countries,” Advances in Experimental Social Psychology 25 (1992): 1-65.
A Person-Centered Managerial Paradigm for the Workplace
323
choosing one’s own goals (having and selecting one’s own purposes), and curiosity (exploring).259
Such self-directed behaviour fosters the individual’s beliefs in his or her own capability to exercise
control over the functioning of their selves in various situations. Self-directed behaviours or self-
regulations enable the dimension of self-determination in individuals, consisting of the characteristic
of autonomy along with its subsequent competence. Relatedness thus becomes an essential means of
increasing individual well-being.
This account of the aspect of autonomy in self-directed behaviour aligns with Valery Chirkov et al.,
who state that “a person is autonomous when his or her behaviour is experienced as willingly enacted
and when he or she fully endorses the actions in which he or she is engaged, and/or the values
expressed by them. People are therefore most autonomous when they act in accord with their
authentic interests or integrated values and desires.”260 In this way, the concept of freedom is
integrated in this aspect of self-direction. An employee who can or is able to self-regulate his or her
workplace behaviour and attitudes is more likely to cope with working situations, while workers with
low self-regulation and high external control are likely to suffer stress, privacy invasion, job related
discrimination and job dissatisfaction from poor handling of competing priorities and values and/or
their consequently poor working behaviour. We thus propose the notion of self-regulation as an
inherent component of employees’ transition to the workplace.
Secondly, “creating capabilities” is important in the human development approach to value self-
monitoring as a qualitative criterion for determining whether people are living their lives in a
manner worthy of human dignity. Previous discussions of the dignity of human beings in the context
of workplace surveillance take sides with the argument that “[h]uman dignity is harmed when
individuals and groups are marginalized, ignored, or devalued.”261 The dignity of all employees is
enhanced within the workplace when a human development approach is introduced that recognizes
the proper place of employees within an organization. Martha C. Nussbaum, emphasizing the ideas
of plurality and non-reducibility proposed by Amartya Sen, also introduces a few elements related to
people’s quality of life, which are plural and qualitatively distinct. Her idea of capabilities is
employed in comparative quality-of-life assessments and in theorizing basic social justice.262 This
approach of creating capabilities, firstly, takes into consideration, “each person as an end, asking not
just about the total or average well-being but about the opportunities available to each person.”263
Secondly, it is “focused on choice or freedom, holding that the crucial good societies should be
promoting for their people is a set of opportunities, or substantial freedoms, which people then may
or may not exercise in action: the choice is theirs.”264 The individual’s power of self-definition is
respected here and leads one, finally, to be “concerned with entrenched social injustice and
inequality, especially capability failures that are the result of discrimination or marginalization.”265
This approach becomes significant within the scope of this research, as it uncompromisingly argues
for the preservation and fostering of human freedom and the capability of responsible self-regulation
and determination.
259 Shalom H. Schwartz, “Are There Universal Aspects in the Structure and Contents of Human Values?”
Social Issues 50, no. 4 (1994): 19-45. 260 Valery Chirkov et al., “A Self-Determination Theory Perspective on Internalization of Cultural Orientations
and Well-Being,” Journal of Personality and Social Psychology 84, no.1 (2003): 98. 261 Moka-Mubelo, “Human Rights and Human Dignity.” 115. 262 Martha C. Nussbaum, Creating Capabilities: The Human Development Approach (Cambridge: The Belknap
Press of Harvard University Press, 2011), 18. 263 Nussbaum, Creating Capabilities, 18. 264 Nussbaum, Creating Capabilities, 18. 265 Nussbaum, Creating Capabilities, 19.
A Person-Centered Managerial Paradigm for the Workplace
324
Nussbaum’s theory of justice makes central the notion of human dignity,266 and she places it at the
basis of what she calls the human development approach. Going beyond an emphasis on the
rationality of human nature, Nussbaum is concerned about the emotions and basic physical needs of
human beings. Having been influenced by modern functionalism,267 Nussbaum explains the human
body and reason in functional terms and thus reflects on human capabilities. These capacities become
functional entities, dependent on the world.268 She differentiates between a few kinds of capabilities:
basic capabilities (untrained practices), internal capabilities (trained capacities) and combined
capabilities (trained capacities with suitable circumstances to its exercise).269 While acknowledging
that not all capacities can serve as a basis formoral claims, following a Rawlsian understanding,
Nussbaum argues for “a holistic account of justification, in which intuitions and political principles,
and alternative accounts of both, are held up and scrutinized against our considered judgments until
we reach, if we ever do, a reflective equilibrium.”270 An individual is encouraged to lead a life worthy
of human dignity when he or she is allowed to develop him or herself through the primary human
capacities of imagination, reason, intuition and freedom of choice.
Nussbaum also looks for “an account of the basis of human dignity that is respectful of the many
different varieties of humanity and that doesn’t rank and order human beings.”271 In this way, she
displaces the predominance of rationality in the discussion of human dignity and introduces a new
framework focused on the development of human capacities. This shows that alongside the
importance of rationality in the constitution of human dignity, the animality of the human being also
plays a role.272 The equal dignity of all members of a species is acknowledged here. Nussbaum thus
opens the door for a more inclusive account of justice. What is important in Nussbaum’s work for
our research is, firstly, the idea of the person, who according to her, “is imagined as having a deep
interest in choice, including the choices of a way of life and of political principles that given it,
[which] stresses the animal and the material underpinning of human freedom.”273 Secondly, its
importance comes from the guiding notion of the capability approach, which is not dignity itself but
rather “that of a life with, or worthy of, human dignity, where that life is constituted, at least in part,
266 Martha C. Nussbaum, “Human Dignity and Political Entitlements,” in Human Dignity and Bioethics: Essays
Commissioned by the President’s Council on Bioethics (Washington D.C.: The President’s Council on
Bioethics, 2008), 351-380. 267 Functionalism is a doctrine or practice that emphasizes practical utility or functional relations of designs,
structures, institutions and society. As a theory it stresses the interdependence of the integrating parts and its
functions in a context. All aspects in a society serve a function for the survival of that society. Functionalism
is explained as a belief that sees a social pattern, not in terms of its historical origin, but in terms of its
consequences for, and functions in a given society, in which all parts of society function in various ways. In
philosophy and psychology, it serves mental states which can be sufficiently defined by their cause, effects
on both mental states and behaviour. So, functionalism can be viewed as a “doctrine that what makes
something a thought, desire, pain (or any other type of mental state) depends not on its internal constitution,
but solely on its function, or the role it plays, in the cognitive system of which it is a part.” Janet Levin,
“Functionalism,” The Stanford Encyclopaedia of Philosophy, ed. Edward N. Zalta (Winter 2017),
https://plato.stanford.edu/entries/functionalism/ [accessed March 5, 2018]. 268 Nussbaum, “Human Dignity and Political Entitlements,” 357. The capabilities approach as a political theory
for human development demands that the state should “provide certain capabilities, as a matter of minimal
justice, to all its members. Martha C. Nussbaum, Frontiers of Justice: Disability, Nationality, Species
Membership (Cambridge, MA: Belknap Press of Harvard Univ. Press, 2006), 71. 269 Nussbaum, “Human Dignity and Political Entitlements,” 357. Cf., Nussbaum, Creating Capabilities, 18-
30. 270 Nussbaum, “Human Dignity and Political Entitlements,” 358. 271 Nussbaum, “Human Dignity and Political Entitlements,” 362. By this argument, she includes all people,
those with mental disabilities, for example, within the realm of respectful human diversity. 272 Nussbaum, Frontiers of Justice, 171-179. 273 Nussbaum, Frontiers of Justice, 88.
A Person-Centered Managerial Paradigm for the Workplace
325
by having the capabilities on the list.”274 We analyse this briefly in the following. The functioning
aspects of dignity is valued here along with capabilities. The capability of autonomy, for Nussbaum,
is related to dignity, and in turn a person’s dignity must be respected for he or she to be autonomous.
The central human capabilities asserted by Nussbaum, which we may take as significant aspects of
a responsible self-regulating behaviour in the workplace, include: (1) life, (2) bodily health, (3)
bodily integrity, (4) the senses, imagination, and thought, (5) being able to have emotional
attachments to entities outside of ourselves, (6) practical reason to form a conception of the good,
(7) affiliation and non-discrimination, (8) living in relation to other animals and nature, (9) play, and
(10) having control (to the extent possible) over one‘s environment.275 The first three of these, life,
bodily health and integrity, concerns people’s abilities to live, to move freely, and to have good
health, without being confined to a state of life not-worth-living or being subjected to assaults and
invasions. The second group, consisting of the senses, imagination and thought, emotions and
practical reason concerns using the senses “to imagine, think and reason and to do things in a truly
human way,”276 enabling one to be attached to people outside of oneself, with the help of the
individual’s practical reason. The last group of capabilities, affiliation, other species, play and control
over one’s environment fosters other-oriented self-expression of care for others; “having social basis
of self-respect and non-humiliation, being able [to treat] and to be treated as a dignified human
being.”277 Applying these capabilities to the workplace context in relation to self-monitoring,
employees will experience enhanced sense of dignity leading to a respect for the dignity of others
and responsible behavioural choices worthy of a human being.
The capabilities of responsible autonomous choice and the practical reason of employees will
enhance the workplace well-being. The espoused principle of capabilities – each person as an end –
stipulates its application in the workplace context: one is not to use employees as a means to enhance
the capabilities of others – most likely others in authority, in managerial roles, at the top of the
organization – or to diminish the dignity of any part of the whole. Rather, one is to promote the full
capabilities of each and every member of the organization, recognizing the dignity of each. The
capabilities approach thus enables employees “to live full and creative lives, developing their
potential and fashioning a meaningful existence commensurate with their equal human dignity,”278
in a workplace context. Likewise, the capabilities, according to Nussbaum, account for minimal
social justice in connection with other pertinent laws and regulations. Nussbaum’s criticism of the
rationalistic reductionism of the concept of dignity, grounding human dignity in the concepts of free
will, individual autonomy, and the ability to be part of a social contract, leads us still closer to a
personalist approach to workplace behaviour.
7.3.2 The Symmetry of Trust and the Transparency for Self-Monitoring
Thirdly, this research proposes that a legitimate symmetry be maintained between trust and
transparency to enable the employee as a moral agent to effectively practice self-monitoring in the
workplace. To explain this, we may consider again the issue of surveillance in the organizational
274 Nussbaum, Frontiers of Justice, 162. 275 Nussbaum, Frontiers of Justice, 76-78; Nussbaum, Creating Capabilities, 33-34. See the reference also in:
Paola Bernardini, “Human Dignity and Human Capabilities in Martha C. Nussbaum,” Iustum Aequum
Salutare 4 (2010): 47-48. Cf., Barry R. Cournoyer, The Social Work Skills Workbook (Boston, MA: Cengage
Learning, 2017), 365; Andrew Sayer, Why Things Matter to People: Social Science, Values and Ethical Life
(Cambridge: Cambridge University Press, 2011), 235. 276 Nussbaum, Frontiers of Justice, 76. We have grouped this list of ten capabilities according to the nature and
usefulness of its further analysis in line with self-regulated behaviours in the workplace. 277 Nussbaum, Frontiers of Justice, 77. 278 Nussbaum, Creating Capabilities, 185.
A Person-Centered Managerial Paradigm for the Workplace
326
workplace. Surveillance, in our previous discussion, has been shown to be a response to a risky
society marked by with suspicion, fear, and distrust, yet ‘spying’ on employees has been shown to
be counterproductive to the establishment of trust and integrity in the workplace. Eric Stoddart admits
in his research that “surveillance fuels a risk society by fabricating people around institutionally
established norms.”279 Surveillance, according to Stoddart, can be understood in relation to the risks
to which it is supposedly the solution. Rather than actual performance, theoretical models are today
often used to set up and legitimize various strategies and even to convince the public that certain
methods of surveillance and intervention are necessary.280 The association of surveillance with fear
is clearly evident in the workplace, where electronic monitoring is continuous and often transgressive
of individual rights. As Frank Furedi has claimed people are panicking under suspicion and fear of
potential harm.281 Individuals have become so accustomed to being fearful that they ever ready to
lend their ears to news of new dangers. Stoddart also believes it is this fabric of fear that individuals
wear, and the drive to be safe and secure, that disposes them to use surveillance strategies.282 This
fear and anxiety for one’s security and the security of one’s loved ones is also plainly associated with
the general climate of distrust so evident today.
In this context, the sheer diversity of technologies quickly outstrips available ethical frameworks,
giving rise to a need for a new attempt to assess the consequences of new surveillance methods. The
ethical criteria of informed consent, job relevance, single usage, and limited and restricted data
transformation are all still valuable. At the same time, “these are of little help with respect to
assessing the appropriateness of original goals, nor do they adequately cover the broader context in
which data are collected.”283 While acknowledging the inability of any universal principle to serve
as the basis for an ethical evaluation of surveillance, Gary T. Marx draws the attention of surveillers
to social norms and proposes a sensitising formula that respects the dignity of the human person.284
However, since the context and strategies of surveillance are manifold, as Stoddart observes, ideas
of dignity, autonomy, and the like remain abstract in this sensitising model.285 In this same line of
thought, we would argue here that information is always relational, and thus that knowledge about
persons is knowledge amongst persons. Such knowledge can engender or endanger mutuality and
solidarity among workers, depending on the level of mutual trust and transparency each one holds.
For surveillance as a kind of ‘virtual gaze’286 endangers this solidarity, which is an indispensable
factor for human flourishing. As Lyon puts it, “deeper than law and technology is the level of mutual
279 Eric Stoddart, Theological Perspectives on a Surveillance Society: Watching and Being Watched (Farnham,
England: Ashgate, 2011), 103. 280 Stoddart, Theological Perspectives on a Surveillance Society, 108. 281 Frank Furedi, Culture of Fear: Risk-Taking and the Morality of Low Expectation (London: Continuum,
2002), 185. 282 Stoddart, Theological Perspectives on a Surveillance Society, 103-104. 283 Gary T. Marx, “Ethics for the New Surveillance,” The Information society 14, no. 3 (1998): 172. 284 In his effort to provide an ethics for the new surveillance, Marx concretely evaluates the means, data
collection, context and use as ethical guides for the assessment of surveillance. As he shows, “the more the
principles implied in these questions are honoured the more ethical the situation is likely to be, or conversely
the fewer of the principles respected, the less ethical the surveillance.” This additive approach is intended as
a sensitizing strategy by Marx who suggests subsequently that equal moral weight cannot necessarily be given
to each factor. Marx proposes 29 sensitising questions which includes the issues of harm, awareness, consent,
public good, and the advantage to the subject. When this additive strategy is adopted, those who supervise
the surveillance might be sensitised to the ethical aspects of their goals and strategies. Marx, “Ethics for the
New Surveillance,” 171-185. 285 Stoddart, Theological Perspectives on a Surveillance Society, 30. 286 Lyon, “Facing the Future: Seeking Ethics for Everyday Surveillance,” 174.
A Person-Centered Managerial Paradigm for the Workplace
327
recognition, of willingness to discuss, of social trust.”287 We elaborate further on these behavioural
models of trust and transparency as expected modes of workplace conduct in what follows.
‘Trust’ is a broad term covering a variety of contexts and relationships. It can be regarded as an
“anticipated cooperation,” characterizing “the expectation […] of ethically justifiable behaviour –
that is, morally correct decisions and actions based upon ethical principles of analysis.”288 Within the
scope and purpose of this research, we will use the concept of trust to indicate the relationship
between two groups of people, employers and employees. We have spoken already of course of the
issue of distrust, which is created by because the use of electronic surveillance practices in the
workplace. According to Helen Nissenbaum, trust is established once one acknowledges and accepts
the presence of perceived personal qualities in the other, along with shared values and commitments.
Common and mutual goals, along with the reciprocity that holds people together in a relationship,
all sustain this expected trust.289 The fulfilment of one’s role in a particular context, such as the
workplace, is also very important in its formation. As Nissenbaum writes, “trust, we learn, is an
attitude. It is almost always a relational attitude involving at least a trustor and a trustee. In this
relation of trust, those who trust accept their vulnerability to those in whom they place trust. [...]
Trust, then, is a form of confidence in another, confidence that the other, despite a capacity to do
harm, will do the right thing in relation to the trustor.”290 When people act with this same confidence
and trust, an intrinsic motivation is generated and each one is led to devote him or herself to the
benefit of oneself, of the other, and of the organization. This intrinsic motivation fosters the self-
regulation and pro-organizational behaviours discussed above.
Francis Fukuyama, in a similar way, describes trust as the “expectation that arises within a
community of regular, honest, and cooperative behaviour, based on commonly shared norms, on the
part of other members of that community.”291 Likewise, trust lowers transaction costs, facilitates
interorganizational relationships, and enhances manager-subordinate relationships.292 In the same
way, trust is “a collective judgement of one group that another group will be honest, meet
commitments, and will not take advantage of others.”293 It is also “one party’s willingness to be
vulnerable to another party based on the confidence that the latter party is (a) benevolent, (b) reliable,
(c) competent, (d) honest, and (e) open.”294 Nevertheless, trust has declined drastically in our day and
any progressive and productive relationship has been eroded and withered in the workplace due to
the pervasiveness of both ‘on-the-job’ and ‘of-the-job’ surveillance. However, when organizational
behaviour is endorsed from the perspective of both employer and employee, within the context of
mutual trust, the need for other-monitoring in the workplace is shown to be irrelevant and extraneous.
287 David Lyon, Surveillance after September 11 (Cambridge: Polity Press, 2003), 154. 288 Roderick M. Kramer, “Trust and Distrust in Organizations: Emerging Perspectives, enduring Questions,”
Annual Review of Psychology 50 (1999): 571. 289 Helen Nissenbaum, “Will Security Enhance Trust Online, or Supplant It?” in Trust and Distrust in
Organizations: Dilemmas and Approaches, eds., Roderick M. Kramer and Karen S. Cook, vol., 7 (New York:
Russell Sage Foundation, 2004), 159-160. 290 Nissenbaum, “Will Security Enhance Trust Online, or Supplant It?” 172. 291 Francis Fukuyama, Trust (New York: Free Press, 1995), 26. 292 Patricia M. Doney, Joseph P. Cannon and Michael R. Mullen, “Understanding the Influence of National
Culture on the Development of Trust,” The Academy of Management Review 23, no. 3 (1998): 601-620. 293 Brad L. Rawlins, “Measuring the Relationship between Organizational Transparency and Employee Trust,”
Public Relations Journal 2, no. 2 (2008): 5. 294 Megan Tschannen-Moran and Wayne K. Hoy, “A Multidisciplinary Analysis of the Nature, Meaning, and
Measurement of Trust,” Review of Educational Research 70, no. 4 (2000): 556.
A Person-Centered Managerial Paradigm for the Workplace
328
In the same manner, the articulation of transparency, as a business priority, is of utmost importance
for a successful and trusting organization.295 For transparency is an essential tool for preserving the
autonomy of both employers and employees and empowering them relative to one another in their
day-to-day job affairs. Though transparency often seems to be an overlooked value in business, it
greatly improves productivity, employee morale, and an organization’s culture.296 Transparency, as
it is generally conceived, “is an individual being honest with himself about the actions he is taking,
[…] is also the organization being upfront and visible about the actions it takes, and whether those
actions are consistent with its values.”297 Brad L. Rawlins urges today’s management to hold true to
some basic tenets in employee management, insisting on authenticity in communication and
relationships and being transparent and open in organizational strategies and behaviours.298 In the
organizational workplace, the proper degree of disclosure of information is dynamically fashioned
through the clear and accurate construction, interpretation, and exchange of information.
Transparency holds any organization accountable for their policies and practices, enhancing the
reasoning capabilities of its members.
The concept of openness is often emphasized in connection with transparency, and this means more
than just the open flow of information. It describes, more specifically, the need to face more and
more active demands for the concealment and disclosure of information.299 Rawlins defines
transparency as “the deliberate attempt to make available all legally releasable information […] in a
manner that is accurate, timely, balanced, and unequivocal, for the purpose of […] holding
organizations accountable for their actions, policies, and practices.”300 Moreover, transparency starts
now to subsume responsibility and accountability in public and private discourse about good
behaviour and governance in any organization. For it acts as a deterrent against corrupt and fraudulent
behaviour by promoting workforce vigilance. Transparency is thus viewed as a relational variable
promoting accountability, cooperation, and commitment and rebuilds trust for a better collaborative
relationship in a working condition.301 For it has always been linked with trust, integrity,
accountability, openness, secrecy, participation, and respect for others.302 Transparency, on the one
hand, is crucial for building trust and maintaining healthy organizational relationships; on the other
hand, transparency requires trust, since being transparent requires a willingness to be vulnerable
given the uncertainty about how the shared information will be used. Building mutual trust between
employers and employees is a high priority challenge for both public and private organizations today.
295 Huth, “The Insider Threat and Employee Privacy,” 368-381. Berggren, E., & Bernshteyn, R.
“Organizational Transparency Drives Company Performance.” Journal of Management Development 26, no.
5 (2007): 411-417. 296 Chuck Cohn, “4 Ways Transparency Can Boost Your Business,” American Express: Open Forum, July 1,
2013. https://www.americanexpress. com/us/small-business/openforum/articles/4-ways-transparency-can-
boost-your-business/ [accessed January 5, 2017]. 297 David Gebler, “Transparency is a Key to Performance,” Blog: Business Ethics, Culture and Performance,
March 14, 2011. http://managementhelp.org/blogs/business-ethics/2011/03/14/transparency-is-a-key-to-
performance/ [accessed January 5, 2017]. 298 Rawlins, “Measuring the Relationship between Organizational Transparency and Employee Trust,” 1-2. 299 Heungsik Park and John Blenkinsopp, “The Roles of Transparency and Trust in the Relationship between
Corruption and Citizen Satisfaction,” International Review of Administrative Science 77, no. 2 (2011): 254-
274. 300 Brad L. Rawlins, “Give the Emperor a Mirror: Toward Developing a Stakeholder Measurement of
Organizational Transparency,” Journal of Public Research 21, no. 1 (2009): 75. 301 Julia Jahansoozi, “Organization-Stakeholder Relationships: Exploring Trust and Transparency,” Journal of
Management Development 25, no. 10 (2006): 942-955. 302 Rawlins, “Give the Emperor a Mirror,” 75-76.
A Person-Centered Managerial Paradigm for the Workplace
329
Transparency reduces organizational malfeasance by means of its ‘open-window’ effect,303 which by
building credibility contributes positively to trust. Hence, trust along with transparency is a vital
indicator or denominator of a satisfactory and complementary relationship between employer and
employee. It is an essential component of cooperation and effective communication and the
foundation for productive relationships. In the same line, Linda Chilers Hon and James E. Grunig
have identified three qualities that have been mutually identified in this transparent and trusting
relationship: integrity, or the belief that a party is fair and just; dependability, or the belief that a party
will do what it says it will do; and competence, or the belief that a party has the ability to do what it
says it will do.304 This will engender organizational behaviour that is more satisfactory for both
parties concerned, and equally so. As organizations become more transparent, they also come to be
more trusted, and this mutual trust among a workforce contributes significantly to productivity and
other forms of desirable organizational behaviour. Relationships, built among co-workers and
between them and their managers through trust and transparency, generate a couple of positive
workplace outcome and strong moral behavioural patterns. In the same way, social relationships at
work are always associated with job involvements and organizational commitments,305 and these are
attained through attitudes of trust and transparency. We therefore here advocate the culture of trust
and transparency as an essential ‘on-the-job’ and ‘off-the-job’ behaviour, and argue against any effort
to legitimate the use of electronic surveillance in a workplace context.
7.3.3 The Notion of Just-Care and Self-Monitoring
Fourthly, the notion of Just-Care is significant in the discussion of self-directed value implementation
and workplace behaviour. Just-Care refers to a combination of care and justice as expressed in self-
directed and self-motivated behaviours in the workplace. We have already discussed the limitations
of the ethics of care, taken on its own, in the first chapter. It is widely recognized, as we have
elsewhere discussed, that “to engage and manage business people and their challenges fairly and
successfully, any business model has to be true-to-life facilitating and bridging business goals with
individual and social fabric of moral life.”306 Justice is held to be the first virtue of social institutions
is generally understood to consist in what people are due as well as the upholding of fairness and
equality. In a societal context, “social justice is a basic structure of cooperation and reciprocity and
essentially depends upon the equal treatment of individual’s fundamental rights and duties, economic
opportunities and social conditions.”307 Thus, social justice applies to both institutions and
individuals alike. On the one hand, it is “a principle that orders institutional activities as suitable for
production and protection of the common good”; on the other, it “is not a principle applying to
institutions alone, but rather a habit of justice applying to and an attribute of individuals.”308 In the
same way, through an analysis of workplace surveillance that takes into account John Rawls’s
principles of liberty and equality, we see that the number of opportunities for meaningful work
declined drastically due to employees being under constant surveillance.
303 David Herald, “Varieties of Transparency,” in Transparency: The Key to Better Governance, eds.
Christopher Hood and David Heald (New York: Oxford University Press, 2006), 25-43. 304 Linda Chilers Hon and James E. Grunig, Guidelines for Measuring Relationships in Public Relations
(Gainesville, FL: Institute for Public Relations, 1999), 1-39. 305 Ivy K. Nielson, Steve M. Jex andGary A. Adams, “Development and Validation of Scores on a Two-
Dimensional Workplace Friendship Scale,” Educational and Psychological Measurement 60, no. 4 (2000):
628–643. 306 Jijo James Indiparambil, “Deconstruction of Power: An Ethical Response to Organizational Surveillance,”
Conference Proceedings, The European Conference on Ethics, Religion & Philosophy 2015, 75-87 (Brighton:
The International Academic Forum, 2015), 82. 307 Indiparambil, “Deconstruction of Power: An Ethical Response to Organizational Surveillance,” 82. 308 Indiparambil, “Deconstruction of Power: An Ethical Response to Organizational Surveillance,” 82.
A Person-Centered Managerial Paradigm for the Workplace
330
The idea of social justice primarily implies the elimination of all forms of discrimination and social
sorting in a manner that respects the fundamental freedom, dignity, and civil and moral rights of all
individuals. In the case of the organizational behavioural context, this means that “individuals are
allowed to freely pursue their aspirations within the legal and moral limits and capacity of concerned
organization.”309 This in turn increases self-regulated behaviours in the workplace. Borrowing from
Paul Ricoeur, we see that social justice is marked by a logic of equivalence,310 which governs
everyday morality in an organization in a specific way, accepting the priority of others and regarding
this from an individual’s self-motivated scheme. It follows the golden rule of morality, treating others
as one wants to be treated by others. As a result, “justice-based evaluation offers an ethical framework
for succeeding and even balancing the moral values of treating people with fairness and dignity
combining material values of productivity and profits of the organization.”311 It also structures and
encourages organizations to promote and enhance the full potential of each of its members by
working for a diffusion of power in a way that is acceptable in any given situation. However, as we
have previously assumed within the scope of this research, the justice approach on its own gives rise
to another limitation, namely that the presumption of general agreement regarding what is just or fair
can antagonize the individual rights and interests of both employers and employees in an
organizational context. Here, the concept of an ethcis of care that goes beyond the ‘justice view’ of
morality and is able to complement the discussion of organizational moral behaviour.
Daniel Engster writes that “caring be viewed as a species activity that includes everything that we
do to maintain, continue, and repair our ‘world’ so that we can live in it as well as possible. That
world includes our bodies, ourselves, and jour environment, all of which we seek to interweave in a
complex, life-sustaining web.”312 According to Engster, care generally denotes “everything we do
directly to help others to meet their basic needs, develop or sustain their basic capabilities, and
alleviate or avoid pain or suffering, in an attentive, responsive and respectful manner.”313 This shows
that the moral and social significance of the fundamental elements of human relationships is
recognised in this care ethics, as it serves to reproduce human life in a constructive way in society.
Care, with its moral considerations of sensitivity, trust and mutual concern, represents human activity
with the added value of social relations and thus presumes a face-to-face enounter, on an
interpersonal level, in the context of which one can respond to the needs of the other.314 Care, in its
ethical reflection, also emphasizes the importance of response, shifting its face from ‘what is just’ to
‘how to respond’ in a responsible and caring way. Thus also it involves attentiveness, responsibility
and a commitment to take into account different perspectives.315 Care thus appears as a moral
foundation for organizational behaviour, directed from and toward the promotion of employees’
self-worth and commitment.
Analysing the modes of thought of Carol Gilligan, who identified a different voice in moral
reasoning, Eric Stoddart identifies moral problems as problems of care and responsibility in
309 Indiparambil, “Deconstruction of Power: An Ethical Response to Organizational Surveillance,” 82. 310 Paul Ricoeur, “Ethical and Theological Considerations on the Golden Rule,” in Figuring the Sacred, ed.
Mark I. Wallace and trans. David Pellauer (Minneapolis: Fortress Press [French original 1987], 1995), 293-
302. 311 Indiparambil, “Deconstruction of Power: An Ethical Response to Organizational Surveillance,” 82. 312 Daniel Engster, “Rethinking Care Theory: The Practice of Caring and the Obligation to Care,” Hypatia 20,
no. 3 (2005): 50-51. 313 Engster, “Rethinking Care Theory: The Practice of Caring and the Obligation to Care,” 55. 314 Ellen Van Stichel, “Love and Justice’s Dialectical Relationship: Ricoeur’s Contribution on the Relationship
between Care and Justice within Care Ethics,” Medicine Health Care and Philosophy 17, no. 4 (2014): 501. 315 Selma Sevenhuijsen, Citizenship and the Ethics of Care: Feminist Considerations on Justice, Morality and
Politics (New York: Routledge, 1998), 16.
A Person-Centered Managerial Paradigm for the Workplace
331
relationships, which are different from those of rights and rules.316 This view looks for new responses
marked by mutual obligation and responsibility on the part of organizational members, and this logic
of interdependence, as we can call it, support an affirmative response to workplace surveillance,
which builds trust, mutual concern and interconnectedness among members of an organization and
in part emerges from the self-regulative model. Neverthless, a too-exclusive reliance on care ethics
seems to be insufficient, as it lacks empirical accuracy and validity in moral reasoning and fails to
offer concrete guidance for ethical action. The liberal concepts of autonomy, equality, and justice
can be incorporated into care ethics, however, and thus make it theoretically indistinct. Therefore,
while both the ethics of care and justice can be applied to all areas of discussions about the workplace
surveillance and the development of individual moral reasoning and self-regulation, one bears greater
authority in some situations than the other. Favouring clarity and certainty and emphasizing the
absolute standards of judgement, the ethic of justice upholds fairness, reciprocity, and rights claims,
whereas the ethic of care emphasises creation and the strengthening of relationships, taking into
account the complexities of relationships among people.317 This situation calls for a combined
analysis of care and justice and their roles in moral reasoning and behaviours.
In this context, the concept of ‘just-care,’ which admits space for both justice and care, enables their
critical and contextual analysis and places them in a harmonious relationship that is far more than
merely dialectical. It places a high ‘rhetorical value’ on human life and on our debate on surveillance
in the workplace.318 Members in an organization with a framework of ‘just-care’, are no longer
independent individuals but are interrelated, and this ethical preference for harmonizing human
relationships is more in favour of crafting social integration than of ensuring the fair imposition of
managerial rules and organizational statutes.319 This combination in business also makes, on the one
hand, the nurturing of our immediate communities and protection of those closest to us the highest
moral obligation, and on the other hand, prompting us to review decisions not in terms of hard rules
but in terms of how they will affect the people with whom we share our lives.320 In this regard, care
leads justice to become ‘more human,’ and care appears as an indispensable precondition for justice.
Justice, in this same vein, helps to prevent a reduction of care to sentimentality321 and enables it to
be practically embodied in diverse situations. A focus on justice helps to make clear that the notion
of care does not only concern the private sphere, as critics have often alleged. Stichel, referring to
Ricoeur, argues that the perceived disproportionality between care and justice is only on an abstract
or ideal level, while on a concrete and practical level they intersect.322 Thus she emphasises the role
that justice can play in effecting the embodiment of care.
316 Eric Stoddart, Theological Perspectives on a Surveillance Society: Watching and being Watched. Farnham
(England: Ashgate, 2011), 43. Cf. Carol Gilligan, In a Different Voice: Psychological Theory and Women’s
Development (Cambridge: Harvard University Press, 1982). 317 Sheldene Simola, “Ethics of Justice and Care in Corporate Crisis Management,” Journal of Business Ethics
46, no. 4 (2003): 351-361. 318 The concept ‘rhetorical value’ is used here about persuading and influencing people for an alternative
response without expecting any concrete solution or answer. Indiparambil, “Deconstruction of Power: An
Ethical Response to Organizational Surveillance,” 83. 319 From a critical-ethical point of view, we can look at the organization/firm itself as a participatory enterprise
or as a social entity with a participatory vision – sharing with the wider society and with its own employees
leading to social enhancement. 320 James Brusseau, Business Ethics Workshop (Irvington, NY: Flat World Knowledge, 2011), 170. 321 Stichel, “Love and Justice’s Dialectical Relationship,” 505. 322 Stichel. “Love and Justice’s Dialectical Relationship,” 505. Cf. Paul Ricoeur, “Love and Justice,” in Radical
Pluralism and Truth: David Tracy and the Hermeneutics of Religion, eds. Werner G. Jeanrond, and Jennifer
L. Rike, trans. David Pellauer, 187–202 (New York: The Crossroad Publishing Company, 1991), 196.
A Person-Centered Managerial Paradigm for the Workplace
332
Justice thus presupposes an attitude of caring, and by bringing together justice and care we can help
to ensure mutual understanding and cooperatively formulated solutions in a given situation.323
According to Stichel, both personal relationships and professional caring practices must be just, such
that equality, its core, is embraced, and its discourses of rights, fairness, and universal principles are
integrated in a situation of moral discernment.324 Here, a discursive ethic of care and a rights-based
ethic of justice coexist and offer a more promising approach to this debate. For in a workplace, ‘just-
care,’ which integrates care ethics and social justice with their respective logics of interdependence
and equivalence, elucidates a positive response to surveillance and engenders a new logic of
superabundance that goes beyond the particulars of any imposed or volunteered norms and
regulations. We use the term ‘superabundance,’ here, in a manner more in line with ‘generosity’, not
purely in the same sense as Ricoeur. He uses this term as what he calls the economy of the gift,325
where we see the domination of the love commandment (logic of superabundance) over the ‘golden
rule’ (logic of equivalence).326 Thus, in organizational surveillance, a contextually determined and
acceptable range of agreement is made compatible with conflicting rights and interests through a
combination of care ethics and social justice, which we bring together here in the category of Just-
Care. Thus, we learn how ethical deliberations can fit seamlessly with managerial statutes in an
organization.
7.3.4 Personal, Corporate and Social Integrity and Self-Monitoring
Finally, this self-regulated moral approach, applied in place of external foms of technological
monitoring, accords importance to Personal, Corporate and Social Integrity and leads to an
integrated and productive workplace that gives sufficient value to all persons concerned. The notion
of integrity is generally described as the quality of being honest, and having a strong adherence to
moral principles. It has taken on several meanings. Researchers view integrity as “a substitute for the
good or the right” and “acting ethically or morally,” but representing a whole integrating all parts
including consistency, relational awareness, inclusion, and the worthwhile purpose of an action.327 It
could show itself as a kind of moral uprightness, whereby one holds consistent moral and ethical
beliefs. Integrity is defined as a measure of coherence and consistency,328 and refers thus to “the
alignment between what one does and what one says” – belonging, doing and saying to the same
whole.329 This consistency discussion also leads to a relational awareness of integrity, as our
relational self exists and serves the expressions of the individual self.330 To understand the wholeness
of the word integrity, researchers like Suresh Srivastva, Frank J. Barrett and Robert Solomon have
integrated the notion of wholeness with notions of relationship and interaction.331 Marvin T. Brown,
323 Robert C. Solomon, “The Moral Psychology of Business: Care and Compassion in the Corporation,”
Business Ethics Quarterly 8, no. 3, (1998): 515-533. 324 Stichel, “Love and Justice’s Dialectical Relationship,” 500. 325 Ricoeur, “Ethical and Theological Considerations on the Golden Rule,” 293-302. 326 Ricoeur coherently articulate ‘the economy of the gift’ more in terms of ‘mutuality’ and ‘generosity’ (logic
of superabundance), basing on the commandment to love one’s enemies, than in terms of ‘reciprocity’ based
on the golden rule of treating each other as one wants to be treated (logic of equivalence). Yet, this logic of
equivalence, as Ricoeur elucidates “governs everyday morality” and the “superabundance becomes the truth
hidden in equivalence” (Ricoeur 1995). 327 Martin T. Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership (Cambridge:
Cambridge University Press, 2005), 5. 328 Amena Shahid and Shahid M. Azhar, “Integrity and Trust: The Defining Principles of Great Workplace,”
Journal of Management Research 5, no. 4 (2013): 64. 329 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 5. 330 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 6. 331 Suresh Srivastva and Frank J. Barrett, “Foundations for Executive Integrity: Dialogue, Diversity,
Development,” in Executive Integrity: The search for High Human Values in Organizational Life, eds. Suresh
Srivastva and Associates (San Francisco, CA: Jossey-Bass, 1980), 291; Robert C. Solomon, A Better Way to
A Person-Centered Managerial Paradigm for the Workplace
333
in this regard, argues that real individual integrity is the result of the conscious relationships which
he or she cultivates. For, according to Brown, “[i]ntegrity applies to both aspects of the self. As a
relational self, integrity requires a relational awareness, a consciousness of the relations in which one
participates. In terms of human action, integrity requires consistency in action; a consistency between
what one says and what one does. Hence, both aspects of integrity are necessary because the self is
both relational and an agent.”332 These relational aspects of integrity introduce the notion of inclusion
into our discussion.
Certain social scientists are trying to relegate integrity to the normative domain, “[a]kin to concepts
such as morality, ethics, and legality, integrity has been assumed to involve a non-scientific value
judgment that cannot be proved right or wrong by facts, evidence, or logic [and] stem from the value
system of the person making the judgement.”333 However, the word ‘integrity,’ on a personal level,
always goes beyond the limited view of ethics to involve the character of persons. It includes various
characteristics that are “consistently considerate, compassionate, transparent, honest, and ethical,”
and with trust defend what is “right […], fair, just, and acceptable.”334 In the same manner, integrity
is not only a personal matter, but rather involves others in many respects. For the notion of integrity,
“at the individual level presumably provides for the kind of soundness and honesty that results in
authenticity of behaviour, being true to one’s own beliefs and standards (personal codes) as well as
to the numerous corporate mission statements and codes of conduct that now mention not just one
but a whole range of stakeholders.”335 Thus the notion of inclusion in integrity entails an ethics of
openness to differences, which also refers “to listening to different voices, even disagreeable
ones.”336 This inclusion also refers to the integration of various ethical ideologies, principles and
theories, as we have already discussed in the previous chapter.
Within an organization or on a corporate level, integrity is not only a means to attain or integrate
ethical principles into its practices and behaviours. Rather, in itself integrity is an ethical principle
providing guidelines for choosing right actions.337 Corporate integrity, similarly, refers to the
“culture, policies and leadership philosophy” that strengthens corporate loyalty, teamwork,
consensus and ethical behaviour.338 On the corporate level, it is individuals of integrity who “cultivate
a consensus around mutual values” and foster a culture of integrity that creates in turn a highly valued
work environment.339 Here, individuals or employees of integrity achieve harmony on the basis of
mutual values and live it out. This harmony in turn builds and develops a culture of integrity, which
“impacts the strong working relationships within the company and creates a highly valued work
atmosphere [where] employees are motivated and innovative, take pride in their work, and enjoy
their affiliations.”340 Among the several interrelated and interdependent dimensions of corporate
integrity, namely the cultural, interpersonal, organizational, civic, and natural, it is the cultural
Think About Business: How Personal Integrity Leads to Corporate Success (New York: Oxford University
Press, 1999), 40. Cf. Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 6. 332 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 7. 333 Mark A. Zupan, “The Virtues of Free Markets,” Cato Journal 31, no. 2 (2011): 172-173. 334 Jan Warren Duggar, “The role of Integrity in Individual and Effective Corporate Leadership,” Journal of
Academic and Business Ethics 3 (2009): 1-7. 335 Shahid and Azhar, “Integrity and Trust: The Defining Principles of Great Workplace,” 68. Cf. Ans Kolk,
Rob van Tulder, and Carlijn Welters, “International Codes of Conduct and Corporate Social Responsibility:
Can Transnational Corporations Regulate Themselves?” Transnational Corporations 8, no. 1 (1999): 143-
179. 336 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 8. 337 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 9. 338 Duggar, “The role of Integrity in Individual and Effective Corporate Leadership,” 2-3. 339 Shahid and Azhar, “Integrity and Trust: The Defining Principles of Great Workplace,” 64-65. 340 Shahid and Azhar, “Integrity and Trust: The Defining Principles of Great Workplace,” 73.
A Person-Centered Managerial Paradigm for the Workplace
334
dimension, according to Brown, which functions as fundamental and holds all other dimensions
together by discovering ways to “relate to persons, experiences, and things.”341 This understanding
fosters further exploration of personal and corporate integrity in the workplace that values a self-
regulated moral approach in the employee management.
Personal integrity, as we have seen, can be explained as an ethical or moral motivation that enables
employees to relate with others in the organization – both significant and non-significant others –
along with relating to the values and interests of others and even with other corporate theories. The
price assigned to the personal integrity of employees, integrating their values and ends for the
workplace and organization, will enable them to actively engage in all work scenarios. Personal
integrity leads to value and gives meaning to different systems of the organization. Thus, Verstraeten,
a business ethicist, rightly refers to the “motivational view of good life,” holding that the ethics of
the organization should not be “a one-way process moving from the company to its employees.”342
Verstraeten illustrates, in this regard that “[i]n order to function well, both company and personnel
need other sources of inspiration. A company should not be a closed circle nor a tree with only a
single root. It also draws inspiration from the rich ideas which its personnel bring to it.”343 In this
way, it gives importance to the person who acts, and in turn this person must assume moral
responsibility for his or her acts. This leads us to consider the necessary competence and practical
wisdom that an agent, here a moral agent, must possess.344 These intellectual qualities of phronesis
or prudentia, according to Verstraeten, introduce the theme of virtue to the discussion of self-
regulated organizational behaviours.
Virtue, as we have seen, is an acquired human quality that employees are supposed to inherit to
enable them to discern what is good in a particular context. It can be explained as a non-instrumental
aspect of ethics, related to judgement and justice, and leading to the creation of a moral character.345
The expression of moral character is assumed in the self-regulatory approach to workplace practices.
To create integral-ethical workplaces and work conditions, employees are figured as ethical subjects.
The education of moral personalities or, in other words, a moral education, is a necessary
precondition for this.346 Along with character development, emotional well-being is a necessity in
the self-regulatory framework. However, it is observed that “[r]arely do the character flaws of a lone
actor fully explain corporate misconduct. More typically, unethical business practice involves the
tacit, if not explicit, cooperation of others and reflects the values, attitudes, beliefs, language, and
behavioural patterns that define an organization’s operating culture. Ethics, then, is as much an
organizational as a personal issue.”347 It is also observed that there are occasions when both personal
and corporate integrity are challenged in an organization. The integrity and values of individuals and
that of organizations may not be the same in all circumstances. We need, therefore, to identity the
core values of an organization through an analysis of respect for the privacy, autonomy and dignity
of employees and the integrity and responsibility of both employers and employees.
341 Brown, Corporate Integrity: Rethinking Organizational Ethics and Leadership, 9. 342 Johan Verstraeten, “From Business Ethics to the Vocation of Business Leaders to Humanize the World of
Business,” A European Review 7, no. 2 (1998): 116. 343 Verstraeten, “From Business Ethics to the Vocation of Business Leaders,” 117. 344 Verstraeten, “From Business Ethics to the Vocation of Business Leaders,” 118. 345 Verstraeten, “From Business Ethics to the Vocation of Business Leaders,” 119. 346 Verstraeten, “From Business Ethics to the Vocation of Business Leaders,” 120. “Moral education requires
the recognition and appreciation of the propaedeutic and educational role played by the narrative communities
outside the business, communities in which people are initiated into the world of texts which create meaning.”
Verstraeten, “From Business Ethics to the Vocation of Business Leaders,” 120. 347 Lynn S. Paine, “Managing for Organizational Integrity,” Harvard Business Review (1994),
https://hbr.org/1994/03/managing-for-organizational-integrity [accessed December 20, 2017].
A Person-Centered Managerial Paradigm for the Workplace
335
A combined-integrity-based approach to workplace management from a self-regulatory perspective
emphasizes the integration of individual and managerial responsibility for ethical behaviour. For as
Lynn S. Paine states, “integrity strategies […] strive to define companies’ guiding values, aspirations,
and patterns of thought and conduct […] such strategies can help prevent damaging ethical lapses
while tapping into powerful human impulses for moral thought and action. Then an ethical
framework becomes no longer a burdensome constraint within which companies must operate, but
the governing ethos of an organization.”348 So, integrity, individual or organizational, is formed
through the practice of self-governance, wrapped up with certain guiding values and principles that
give life to an organization and its members. Paine, in this regard, continues that “[f]rom the
perspective of integrity, the task of ethics management is to define and give life to an organization’s
guiding values, to create an environment that supports ethically sound behaviour, and to instil a sense
of shared accountability among employees.”349 The self-regulatory approach, combined with
integrity, enables employees and to view ethical responsibility as a constructive, not constraining,
aspect of worklife in any organization.
Finally, integrity, in the context of ethics in the workplace, is referred to as “honesty and truthfulness
or accuracy of one’s actions,” “the opposite of hypocrisy,” and thus also to refer to the consistency
of one’s character.350 To sum up, the understanding of integrity within the scope of this research
points us to multiple dimensions: “(1) balance between institutional loyalty and moral autonomy, (2)
moral courage in a social context to stand up for and respect others as well as oneself, (3) honesty,
(4) altruism, acting courageously for the benefit of others even when attacked and criticised, (5)
understanding global norms of justice and fairness, and (6) openness to community evaluation.”351
These aspects of integrity practiced in the workplace make it more productive and thus life
enhancing, enabling all members to contribute to the well-being of each other.
We may conclude this discussion by quoting Rosenberg’s remark that “[t]aking an ethical point of
view in managing the workplace is not a formula for losing control. Treating employees with respect
and creating an environment that encourages commitment, resourcefulness, and responsibility can
be equated with capital investment to improve productivity. Establishing ethical ground rules and
enforcing them fairly demonstrate a commitment of management to respect its workers and their
efforts.”352 On the part of employees, the feeling of being valued and respected enables them to
develop a deeper sense of personal commitment to the organization and its mission and to behave in
accord with the legitimate judgements of various situations taking appropriate decisions. This in turn
will lead to right action in the workplace. Having said this, we may now review the main features of
what is called Christian personalist management. This is exemplified by Domènec Melé, a Catholic
theologian and business ethicist, who sought to situate Labourer Valued Management and Self-
monitoring in the wider context of personalism and the person-centered approach of employee
management in the workplace.
348 Paine, “Managing for Organizational Integrity,” https://hbr.org/1994/03/managing-for-organizational-
integrity [accessed December 20, 2017]. 349 Paine, “Managing for Organizational Integrity,” https://hbr.org/1994/03/managing-for-organizational-
integrity [accessed December 20, 2017]. 350 Carley H. Dodd and Matthew J. Dodd, “What is Integrity?” in Business and Corporate Integrity: Sustaining
Organizational Compliance, Ethics, and Trust, ed. Robert C. Chandler, 3-13 (California: ABC-CLIO, LLC,
2014), 5. 351 Dodd and Dodd, “What is Integrity?” 6. 352 Rosenberg, “The Technological Assault on Ethics in the Modern Workplace,” 148.
A Person-Centered Managerial Paradigm for the Workplace
336
7.4 DOMÈNEC MELÉ AND A HARMONIZING PERSONALIST MANAGEMENT REVIEW
Domènec Melé, illustrating the wide use of analytical tools in the field of management, points to a
reductionism dominant in the consideration of the human role in business and in the workplace.353
This problem of reductionism is widely experienced in the workplace, as we have explored in this
research, due to ubiquitous surveillance practices. Understanding the narrow view of human beings
as homo oeconomicus – economic man – with only an instrumental rationality, Melé argues for a
new manifesto for management that considers the intrinsic value of openness to human development
and human flourishing and calls for a rethinking of economics, business and management from a
humanistic or personalistic perspective.354 Humanistic management “emphasises the human
condition and is oriented to the development of human virtue in all its forms, to its fullest extent.”355
Referring to Gaudium et spes, Melé summarises the base for humanistic management that “Man is
the source, the centre and the purpose of all economic and social life.”356 Business and organizational
managements are to practice humanism by respecting the humanity of each member of their
organizations, treating them as an end, favouring human potentials in creativity, rationality, and
character, fostering the exercise of freedom with a sense of responsibility and contribute to human
well-being.357 The Person is the centre of this approach.
Humanistic management affirms the centrality of persons in organizations and the development of
their faculties, affairs, and well-being.358 This approach to management stresses the importance of
human behaviour, needs and motivations. It also presupposes the decentralization of power and
provision of workers with opportunities for decision-making. It also assumes that dealing with
employees in a more humane way will increase performance and productivity in the workplace. This
humanistic perspective thus seeks to effect a shift “from organisations in which each person is just a
cog in the business machine to organisations in which people are put first, with a greater degree of
involvement, commitment, and participation.”359 It also recognizes the personal competences of each
member of the organization. To this end, Melé brings joins the personalist principle and the common
good principle, focusing on interpersonal relationships and that of individuals or group [of
employees] and organization or wider society. This will make even moral reasoning and decision-
making suitable to the situation, taking into account its specificity and complexity. This personalist
353 Domènec Melé, “Editorial Introduction: Towards a More Humanistic Management,” Journal of Business
Ethics 88, no. 3 (2009): 413. 354 Melé, “Editorial Introduction: Towards a More Humanistic Management,” 414. Along with considering
efficiency in management, it is vital to consider people in their fullness. 355 Domènec Melé, “Antecedents and Current Situation of Humanistic Management,” African Journal of
Business Ethics 7, no. 2 (2013): 52. To explain humanism, Melé quotes French Philosopher Jacques Maritain,
who states “humanism tends essentially to render man more truly human and to manifest his original greatness
by having him participate in all that can enrich him in nature and history … [I]t at once demands that man
develop the virtualities contained within him, his creatives forces and the life of reason, and work to make
the forces of the physical world instruments of his freedom.” Melé, “Antecedents and Current Situation of
Humanistic Management,” 53. Cf. Jacques Maritain, “Integral Humanism, Freedom in the Modern World,
and a Letter on Independence,” in The Collected Works of Jacques Maritain (Original: Integral Humanism:
Temporal and Spiritual Problems of a New Christendom, 1938), ed. Otto Bird, trans. Otto Bird, Joseph Evans,
and Richard O’Sullivan (Notre Dame, IN: University of Notre Dame Press, 1996), 153. 356 Melé, “Antecedents and Current Situation of Humanistic Management,” 53. Cf. Vatican Council II.
“Gaudium et Spes.” AAS 58 (1966), no. 63. It also urges that “[i]n the economic and social realms, too, the
dignity and complete vocation of the human person and the welfare of society as a whole are to be respected
and promoted.” 357 Melé, “Antecedents and Current Situation of Humanistic Management,” 53. 358 Melé, “Antecedents and Current Situation of Humanistic Management,” 54. Cf. Domènec Melé, “The
Challenge of Humanistic Management,” Journal of Business Ethics 44, no. 1 (2003): 77-88. 359 Melé, “Antecedents and Current Situation of Humanistic Management,” 59.
A Person-Centered Managerial Paradigm for the Workplace
337
review indeed sums up all previous ethical discussions and offers new responses to the new ways of
employee management.
7.4.1 Integrating Personalist and Common Good Principles
Personalism, often qualified as humanism, “holds the centrality of the human person in social,
political, economic, and environmental contexts […] emphasizing the uniqueness of person and his
or her dignity.”360 By giving importance to personal autonomy and freedom, personalism seeks to
enables individuals to become the true subjects and causes of their actions and affirms the centrality
of human persons. According to Melé, personalism “emphasizes human consciousness, intentionality
toward ends, self-identity through time, value retentiveness, openness to community building, and,
above all, the dignity of every human being.”361 This means that, in its strict sense, personalism
“focuses on the reality of the person […] and on his unique dignity, insisting on the radical distinction
between persons and all other beings (non-persons) [and] draws its foundations from human reason
and experience.”362 Though historically it emerged as an accompaniment of biblical theism and draws
insights from revelation, it is applied now to different branches of [speculative] thought such as
philosophy, theology, economics, psychology, sociology, and so forth. Melé distinguishes
personalism from both individualism and collectivism. For him, a person exists not in isolation or
united through mere social contracts, but has an interdependent existence by both possessing intrinsic
relationships and maintaining individual autonomy and freedom. Each person is thus a unique
being.363 This interiority, autonomy, freedom and interchangeability in relationships makes clear the
uniqueness of personalism.
In line with the analysis of employees as virtuous persons, Melé introduces a realistic personalism,
consisting of personalist rational principles and common good principles, which are integrated into
the ethical behaviour and culture of organizations.364 These personalist principles serve employees
to act ethically in various situations in the workplace. Reflecting on the personalist principle, Melé
cites the Golden Rule – the ethics of reciprocity – as its remote antecedent and formulates it in a
novel way: as a call to “put yourself in the place of another.” He argues that “one has a right to just
treatment, and a responsibility to ensure justice to and for others.”365 This is considered the basic
global ethical norm for universal principle of justice with both positive (do your best for others) and
negative (do no harm to others) formulations. However, according to Melé, the consideration of
human dignity – the intrinsic worth of humans – gives a new dimension to the Golden Rule. It is
defined as “the sacredness or value of each person as an end, not simply as a means to the fulfilment
of others’ purposes.”366 This dignity as an inherent part of the human condition has already been
discussed in previous sections. Along with respecting each person’s rights – concerns about what
justice requires - human dignity as the absolute worth of the human person stresses “benevolence
360 Domènec Melé, “Integrating Personalism into Virtue-Based Business Ethics: The Personalist and the
Common Good Principles,” Journal of Business Ethics 88, no. 1 (2009): 229. 361 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 229. 362 Thomas D. Williams, “What is Thomistic Personalism?” Alpha Omega 7, no. 2 (2004): 164. 363 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 229. 364 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 227-244. 365 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 230. The Golden Rule is expressed as
“do unto others as you would have them do unto you.” This command of Golden Rule assures the moral
rightness of human action. Gerhard Zecha, “The Golden Rule in Applied Ethics: How to Make Right
Decisions in Theory and Practice,” Anuarul Institutului de Istorie "George Baritiu" din Cluj-Napoca - Seria
HUMANISTICA 9 (2011): 90. 366 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 231.
A Person-Centered Managerial Paradigm for the Workplace
338
and care, that is concern and solicitude for their needs.”367 Thus, Melé formulates the personalist
principle as: “No human being should ever be treated as mere means to an end. On the contrary,
persons should be treated with respect and also with benevolence and care.”368 Personalist principles
therefore include the rights and duties of justice as well as the obligations of benevolence and care.
The personalist principle is also viewed as a basis for human rights, such as natural rights or human
rights, due to the fact of being human, in addition to rights acquired through contracts. For instance,
in this regard, Melé refers to Robert Spaemann, who writes that “the recognition of human beings as
persons includes recognizing whatever the person possesses as a part of his human condition: life,
body, reputation, property or freedom of movement […] and any other feature related to human
goods.”369 The personalist principle provides a sound basis for claims concerning intrinsic human
rights, which are inviolable and inalienable. What do rights, justice, benevolence and care mean in
an organizational business or workplace context, according to the personalist principle? In Melé’s
view, it means “acting with a sense of service and collaboration and giving the due care toward
collaborators and other stakeholders,”370 which includes practical wisdom and the freedom to
develop virtues for every member of the organization. This will enable the actions of the individual
employee to be in conformity with the proper expectation of the organization and will lead to an
increase in productivity and services. Melé also remarks upon the social dimension of the person in
the organization in his exploration of the common good principle. The capability of each member of
the organization to associate with one another through mutual interests and understanding is the key
factor here. Though this collaboration can be viewed in relation to public recognition, seeking self-
interest and reputation, Melé demands that it be recognized as an end in itself,371 for personalism
regards this collaboration and sociability to be inherent in persons having equal dignity and rights.
In his profound analysis, Melé relates the sociability of the human person to the notion of the common
good by noting the human inclination to obtain what one thinks to be good.372 Since an organization
is established with a view to some good, all its members, along with their pursuing their own good,
share this common or collective good. The social dimension of individuals relates to the notion of
the common good and the view that members “belong to a community are united by common goals
and share goods by the fact of belonging to the community.”373 The factors that shape an organization
as a community of persons are the following: individual contribution through cooperation, mutual
respect and openminded commitment to the organization, as well as the attitudinal and behavioural
alterations in favour of the personal and organizational good. Through social cooperation every
individual member of the organization fulfils his or her “existential end” and thus “enjoys the
possibility of realizing his true self by participating in the effects of the cooperation of all.”374 Thus,
the concept of the common good in organizations enables its members to formulate conditions for
367 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 232. The personalist principle or the
personalist norm of Wojtyla, which includes the respect, care and benevolence, is already discussed in the
previous section. 368 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 232. Personalist principles in general
prohibits making any attempt on or against human life and physical integrity, “slavery, exploitation and
manipulations” and any “mistreatment of persons or groups.” 369 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 233. Cf. Robert Spaemann, Happiness
and Benevolence, trans. Jereiah Alberg (Notre Dame: Notre Dame University Press, 2000), 185. 370 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 233. 371 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 234. 372 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 234. Melé distinguishes here the
‘apparent good’ from authentic human good. For instance, obtaining money through a fraudulent activity is
an example of apparent good as it attracts in some way but not real good as it corrupts human being. 373 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 235. 374 Johannes Messner, Social Ethics: Natural Law in the Modern World, trans. J.J. Doherty (USA: Herder, St.
Louis, 1965), 118, 124. Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 235.
A Person-Centered Managerial Paradigm for the Workplace
339
increasing opportunities for all to flourish. The notion of the common good, as Melé envisages it,
goes beyond the limitedness of concepts like ‘common well-being’ and ‘public interest’ (only
material conditions) as well as the notion of ‘general interests’ (majority opinion), and seeks human
flourishing in its entirety.
In this way, within the context of the organization or workplace, Melé observes that “providing goods
at a fair profit is a goal common to every business. A culture of commitment and cooperation, and a
good work climate is part of the common good of the firm.”375 So, the concept of the common good
consists of several aspects, including socio-cultural values shared in the organization, rights and
freedom, safety and justice, etc., as well as organizational conditions including both economic
dimensions (just laws, fair treatment, trials and procedures) and environmental ones (sustaining
fitting habitat). The description of the common good and other decisions and concerns of employees
must, therefore, be “always with the due respect for human dignity and innate rights, and following
the legitimate proceeds established within such community.”376 Likewise, the relationship of
employees with the organization must involve consciousness and freedom as well as ethical
collaboration and contribute to the common good. This collaboration does not entail a full
subordination of the individuality of employees to all the common interests of organizations at the
cost of one’s dignity and autonomy. For Melé, referring to Wojtyła, states that “Thomistic
personalism maintains that the person should be subordinated to society in all that is indispensable
for the realization of the common good, but the true common good never threatens the good of the
person, even though it may demand considerable sacrifice of a person.”377 This means that the notion
of the common good under no circumstances devalues the personhood. On the contrary, it contributes
to employee flourishing in the organization. This reflection on personalist principles leads us to the
perception of business organizations as communityies of persons.
7.4.2 The Organization as a Community of Persons
In accord with phenomenological-personalist thought, Melé regards a firm as a community of
persons, and emphasizes “the uniqueness, conscience, free will, dignity, and openness to human
flourishing.”378 Personalism considers matters affecting human life as a whole. This means that, over
against the “economism-based business ethos” that perceives the business organization as a set of
contracts, Melé here argues for a humanistic business ethos that regards every business enterprise in
its human wholeness.379 He begins his discussion by first illustrating the current managerial views of
organizations and shows their limitations before proposing an alternative view. One view he
considers, for instance, reduces the organization to a nexus of contracts, “aggregate of individuals
united exclusively for reasons of power and interests, through a set of contracts.”380 Agency theory
375 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 235. 376 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 236. 377 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 236. Cf. Wojtyla, Person and
Community: Selected Essays, 174. Melé here “differs from collectivistic ideology, which holds that human
persons should be subordinated to society in all things, and from the individualistic approaches which place
the interests of the individual over the common good.” Melé, “Integrating Personalism into Virtue-Based
Business Ethics,” 236. 378 Domènec Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” Journal
of Business Ethics 106, no. 1 (2012): 89-101. 379 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 90. 380 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 90. Melé, in this
regard, quotes Hessen who argues organization consists only of individuals with certain types of contractual
relationships with one another. Robert Hessen, In Defence of the Corporation (Stanford, CA: Hoover
Institution, 1979), xiii. He refers also the influential economist Ronald Coase who sees business firms and
organizations as instruments of economic efficiency. Melé also speaks about the psychological and social
A Person-Centered Managerial Paradigm for the Workplace
340
or agency cost theory, which we have previously discussed in the first chapter, could be an easy
extension of this type of thinking, as it deals with explicit or implicit contracts between two groups
of people.
Another perspective proposes that corporations are simply a coordination of connected networks of
concurrent interests of the various stakeholders.381 This view goes beyond mere contractual ideas.
According to Melé, this understanding of organizations “as a constellation of interests adds a human
aspect to the ‘skeleton’ of contracts, but it is still insufficient for a whole view of the firm.”382 Thus
he brings the commitments and moral (altruistic) behaviours within the discussion and holds that
corporations are communities with intrinsic values. Melé also introduces other concepts than
contracts and interests in his discussion of organizational behaviours, many of which we have already
discussed. For instance:
The concept of “organizational commitment,” which regards the attachment of employees to the
organization and involves economic, sentimental and also normative motives for such attachment;
“organizational identification,” or degree to which an employee experiences a “sense of oneness”
or psychological bonding between themselves and his or her work organization; and
“organizational citizenship behaviour” which has been defined as “individual behaviour that is
discretionary, not directly or explicitly recognized by the formal reward system, and that in
aggregate promotes the effective functioning of the organization.383
This type of behaviour often goes above and beyond the domains of duty, interests, and contracts.
Besides, following social capital theory, Melé acknowledges the presence of social capital, which,
as a source of social relations within organizations characterized by trust, cooperation,
interdependence, interaction, etc.,384 suggests that organizations should be viewed as human
communities rather than any more abstract entity. What is valued in a community is human
relationships, and these relationships among employees are related to organizational efficiency and
increased productivity, benefitting all members concerned. Similarly, Melé quotes Robert C.
Solomon, who writes that “what makes a corporation efficient or inefficient is not a series of well-
oriented mechanical operations but the working interrelations, the coordination and rivalries, team
spirit and morale of many people who work there and are in turn shaped and defined by the
corporation.”385 So, corporations become communities through members’ relationships and through
their moral behaviours. Thus, he continues, referring to Koehn, that “people become what they are
within a community and their moral character is relevant for making contributions to the society or
communal enterprises.”386 Furthermore, referring to Catholic Social Teaching and in particular to
Mater et Magistra, Gaudium et Spes and Centesimus Annus, Melé stresses the notion of a business
as a community of persons, associated with various ethical requirements. Verstraeten, as a Catholic
contracts in this way in connection to organizational mutual behaviours and rights and duties. Melé, “The
Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 90. 381 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 91. R. Edward
Freeman, “Business Ethics at the Millennium,” Business Ethics Quarterly 10, no. 1 (2000), 169-180; R.
Edward Freeman and Jeanne Liedtka, “Corporate Social Responsibility: A Critical Approach,” Business
Horizons 34, no. 4 (1991), 92-99. 382 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 91. 383 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 91. 384 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 91. 385 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 93. Cf. Robert C.
Solomon, Ethics and Excellence: Cooperation and Integrity in Business (New York: Oxford University Press,
1992), 150. 386 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 93. Cf. Daryl
Koehn, “A Role for Virtue Ethics in the Analysis of Business Practice,” Business Ethics Quarterly 5, no. 3
(1995): 537.
A Person-Centered Managerial Paradigm for the Workplace
341
theologian and business ethicist, also views a business as a community of persons.387 Organizations
are therefore valued as communities of interrelated persons with, to a certain extent, a shared moral
sense.
In an organization, a virtuous relationship, which is motivated by a willingness to stand for a good
cause, is preferred over the other many kinds of relationships we have discussed above, such as
utilitarian relationships with utilitarian interests, or emotional relationships based on enjoyment.388
Virtuous or interrelated, collaborative and constructive relationships among employees are a real
contribution to human life chances. An organization, with the deep relationship of a stable group of
employees or association, is considered a substantive community, in contrast to ephemeral
communities that have only occasional meetings.389 For, as Melé defines it, a community, in a strict
sense, “entails a permanent community of life between persons that affects them in the depth of their
being and confers on them a lasting stamp.”390 Intersubjective relationship is the decisive factor in
this community of persons, in which a feeling of “we” in the organization drives its member common
pursuit of a goal, without losing the full subjective personalities of each.391 This validates the concept
of an organization as a community of persons behaving together. However, it is more than a mere
collectivist view of individuals that overlooks the fullness of individual members of an organization.
It is a personalist understanding, or a humanistic perspective, and can contribute much to our research
here.
The concept “person” for Melé has “a connotation of individuality, uniqueness, and possession of
intimacy” having “self-conscience, self-determination, and consequently, a subject of moral acts, and
endowed with intrinsic dignity.”392 In this regard, Melé, from his humanistic perspective, bases
himself on the writings of Pope John Paul II and argues for the inner orientation of individual actions
towards oneself, along with or more than the expected external good. Employees’ actions in an
organization include “a moral judgment by which a person determines him or herself as a human
being,” as it comprehends the “self-determination and self-realization of the acting person.”393 Being
aware of the actions that contribute to human flourishing as well as those that erode the humanity of
acting persons, Melé gives importance to human inner experiences and thus to employees’ human or
personal characteristics. Any action by an employee with freedom and a capacity for self-realization
contributes to this personalistic value of persons. Hence, an inherent position of this ‘personalistic
value’ before the ‘ethical value’ of the action is illustrated by Melé, relating the former with the
person as the rational free subject, and the later with ethical norms. Identifying this “personalistic
value inherent in every human action” also leads to the identification of the “intrinsic social or
communitarian dimension” of the action, when performed together with others. This simply requires
387 Verstraeten, “From Business Ethics to the Vocation of Business Leaders,” 112. 388 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 95. 389 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 95. 390 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 95. Cf., Edith
Stein, La estructura de la persona humana (first published in German as ‘Der aufbau der
menschlichenperson’, 1994) (Madrid: BAC, 1998), 249. 391 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 96. Cf., Karol
Wojtyla (Pope John Paul II), Person and community: Selected Essays, translated by O. Theresa Sandok (New
York: Peter Lang, 1993). 392 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 96. Cf., Robert
Spaemann, Persons: The Difference between ‘Someone’ and ‘Something,’ trans. Oliver O’Donovan (Oxford:
Oxford University Press, 2006). 393 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 96.
A Person-Centered Managerial Paradigm for the Workplace
342
that one respect the personalistic value of actions in oneself and in others.394 This respect mutually
rendered to the humanity of each other leads also to self-actualization.
Thus, Melé introduces a “personalist principle,” referring to the “personalistic norm”395 of Karol
Wojtyła, and argues that this personalist vision “goes beyond the sociological determinism, which
attempts to explain the person’s action through a set of social relations in which person is only a cog
within a mechanism.”396 It also goes against any position that fails to acknowledge the inter-
subjective dimension present in every action. In this way, an anthropological point of view is declared
and professed when an organization is viewed as a community of persons with the ethos of a
humanistic perspective. Hence, Melé defines an organization or business enterprise as “a community
of persons based on cooperative activity to provide goods and services in an efficient, competitive
and profitable way.”397 Illustrating this, he also points to the ethical implications of this identification
of organizations as communities of persons, presuming a higher purpose. As a first principle, such a
corporation or organization will regard itself as a citizen of a larger community. Referring to Robert
C. Solomon, Melé states that corporations, like individuals, are part of the community and have
intrinsic responsibilities as social entities.398 A community, for Solomon, is “an open-ended and
immensely complex set of relationships between its members, who may, within that context, be
called ‘individuals.’”399 The organization or corporation is viewed here as a tangible community; a
community of persons.
According to Solomon, “communities and the spirit of community are fundamentally concerned with
complementarity and differences, out of which emerge relationships of reciprocity and cooperation
[consisting] a shared sense of belonging, a shared sense of mission [… and] mutual interest.”400 An
organization, in this way, is a community consisting primarily of its members – employers,
employees, stakeholders and consumers. When an organization is viewed as a community of persons,
as Melé observes, all members are regarded as a core part of this group, all bearing responsibility for
each other and treating one another with “respect and a sense of cooperative reciprocity.”401 So, along
with valuing and respecting human dignity and the associated rights of employees, an attitude of
benevolence and care is also demanded from organizational behaviours, an attitude that takes into
account the personal conditions and needs of each employee.402 Similarly, the sense of benevolence
394 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 96. 395 Reformulating the Kantian description on human dignity Karol Wojtyla writes that “whenever a person is
the object of your activity, remember that you must not treat that person as only the means to an end, as an
instrument, but must allow for the fact that he or she, too, has, or at least should have, distinct personal ends.”
Karol Wojtyla, Love and Responsibility (San Francisco: Harper-Collins (first published in Polish, Miłos ´c ´
i Odpowiedzialnosc. Studium etyczne. Lublin: KUL, 1960), 1981), 28. Melé quotes the same in his
explanation of personalist reading of employees’ behaviours in the organization. Melé, “The Firm as a
“Community of Persons”: A Pillar of Humanistic Business Ethos,” 97. 396 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 97. Cf. Domènec
Melé, “Integrating Personalism into Virtue-Based Business Ethics: The Personalist and the Common Good
Principles,” Journal of Business Ethics 88, no. 1 (2009): 227-244. 397 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 97. 398 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 97-98. Cf. Robert
C. Solomon, “The Corporation as Community: A Reply to Ed Hartmann,” Business Ethics Quarterly 4, no.
3 (1994): 271-285. 399 Solomon, “The Corporation as Community,” 277. He explains it further stating “[t]he particular individuals
may come and go. Indeed, in that sense the corporation is rarely the same from one day to the next. But the
relationships, always forming, being reinforcing and reforming.” Solomon, “The Corporation as
Community,” 277. 400 Solomon, “The Corporation as Community,” 277. 401 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 98. 402 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 277-284. Cf. Melé, “The Firm as a
“Community of Persons”: A Pillar of Humanistic Business Ethos,” 98.
A Person-Centered Managerial Paradigm for the Workplace
343
and care in the organization, which we have already discussed, does not disregard the attention given
to efficiency, competitiveness and profit,403 and this in turn fosters trust and cooperation among the
members of an organization. Organizations as communities of persons not only constitute and
contribute to the “respect for the freedom of corporate employees […] but also expresses their
condition as a person, one who can never be treated as a passive or unconscious element within the
organization.”404 This cooperation of all members in the organization for a common goal or common
good is the ethical behaviour required of all in the workplace. Relationships based on ethics go
beyond contractual duties and foster employees’ flourishing in organizations, which consisting of
persons – which are communities of persons – who are conscious and free beings.
One of the leading challenges that arises in the effort to create social relationships among employees
within an organization is the usual managerial attitudes and practices, which are “based on protecting
the organization from its own employees, using hierarchical authority to prevent opportunistic
behaviour, or rewarding and punishing employees to guarantee that everyone does what they are
expected to do.”405 Our research has shown that these characteristics predominate when electronic
and other forms of external monitoring and ubiquitous surveillance are enforced in the organization,
in view of security and productivity. There arise feelings of distrust among employees who are
always subjugated to power. We have seen also how this electronic surveillance creates opportunistic
behaviours. Melé thus states that in order to develop an organization as a community of persons, all
working together for the betterment of both employee and employer alike and thus fulfil the goals of
the organization, managerial behaviours must construct an ethical paradigm that “falls outside any
job description or any mandatory rule or procedure.”406 Hence, a humanistic-based management
model, such as the Labourer valued management approach proposed in this research, is much
required today and recommended for organizations.
7.4.3 Humanizing/Rehumanizing the Culture in Organizations
We have already discussed above the emergence and development of an ‘organizational culture’ and
how it is formed and sustained in organizations. This differently formed organizational culture is said
to be “a determinant of performance through employee behaviour and decision patterns,”407 as it
consists of an ethos within the organization on which its specific culture is based. An organizational
culture influences how things are done in organizations by incorporating certain shared and stable
beliefs and values.408 Melé explores and argues for a humanizing culture in organizations, which in
his view gives a human character to all performances and behaviours. On the one hand, it must be
“an organizational culture appropriate to human beings” corresponding to human conditions, and on
the other hand, it must “be appropriate for fostering human fulfilment in those involved in it.”409
Here, all members of the organization, as Melé envisages, though already human, become more
human by achieving what is termed human flourishing or human fulfilment. This is what is meant
by re-humanizing the workplace. Melé in this regard indicates a few features of a rehumanized
403 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 98. 404 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 98. Cf. George G.
Brenkert, “Freedom, Participation and Corporations: The Issue of Corporate (Economic) Democracy,”
Business Ethics Quarterly 2, no. 3 (1992): 251–269. 405 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 99. Cf. Paul S.
Adler and Seok-Woo Kwon, “Social Capital: Prospects for a New Concept,” Academy of Management Review
27, no. 1 (2002): 17-40. 406 Melé, “The Firm as a “Community of Persons”: A Pillar of Humanistic Business Ethos,” 99. 407 Domènec Melé, “Organizational Humanizing Cultures: Do They Generate Social Capital?” Journal of
Business Ethics 45, no. 1-2 (2003): 3. 408 Melé, “Organizational Humanizing Cultures,” 4. 409 Melé, “Organizational Humanizing Cultures,” 4.
A Person-Centered Managerial Paradigm for the Workplace
344
organizational culture that are shared by all members of organizations who play a role in creating
and sustaining an organizational culture.
One principal feature of the humanizing or rehumanizing culture is the “recognition of the person in
his or her dignity, rights, uniqueness, sociability and capacity for personal growth.”410 This, in the
organization, acknowledges the intrinsic dignity of each member through one’s innate faculties of
reason, consciousness, freedom, intimacy and the ability to transcend oneself. What makes this
unique is that it recognizes, on the one hand, the unrepeatable differences of each member of the
organization with each one’s uniqueness, and on the other, the sociability of human beings that gives
employees the capacity to participate in social life.411 These all become part and parcel of re-
humanizing culture in the workplace. This humanized culture will recognize the capacity of each
member as human being for personal growth including all the aspects of human life – the physical,
the moral and the virtuous. This is the capacity for personal growth. We have already discussed the
role of virtuous acts, which are acquired through good decisions. These acts make an employee the
kind of person he or she wants to be and, in this way, increase employees’ capacity for respect,
service and cooperation.
All these dimensions formulate subsequently a set of innate rights of employees as human beings
and leads to the second feature of rehumanizing the workers, workplace behaviours and cultures:
namely, giving respect to persons and to their human rights.412 According to Melé, “[r]especting
persons and their human rights also means integrity, with a steadfast attitude of trustfulness, keeping
promises and fulfilling contacts, fairness and organizational justice.”413 An attitude of “care and
service for persons around one” is the third feature of an organizational humanizing culture. This
attitude of care, which goes beyond the regularities of rights and duties and focuses on improving
employees’ life chances and personal growth, has been discussed in a previous section. Melé
illustrates here that respect and rights are ethically in tune with prohibitive norms, while care and
service are related more to affirmative norms and needs, including ethical rationality and the practical
wisdom needed to enact it.414 The limitations of the ethics of care have been explored above, and
both care and justice are valued in the context of organizational surveillance and workplace
behaviours. However, care is important, as its dimension of benevolence is an essential factor for
human fulfilment, even in organizational contexts.
This understanding of care and justice further leads to the forth feature of humanizing the workplace:
managing towards the common good rather than particular interests.415 Melé disregards here the
limited view of business as a mere mechanism for profit or an organism adapting to different
environments, and argues that “if persons have human dignity and intrinsic rights, they cannot be
treated as mere instruments for profits nor as simple resources for performance, adapting themselves
to market and other environment conditions.”416 For a rehumanizing organizational culture, the vision
of the organization must go beyond the limited view of business enterprises and organizations. So
organizations, formed by different members sharing common goals, have an interconnectedness
among their members and is most accurately characterized as community of persons united in pursuit
410 Melé, “Organizational Humanizing Cultures,” 5. 411 Melé, “Organizational Humanizing Cultures,” 5. 412 Melé, “Organizational Humanizing Cultures,” 5. Melé observes and recognizes also the human conditions
having innate rights of his/her-own through life, body, freedom, etc., and acknowledges all members of the
organization as human beings are equal in dignity and rights. 413 Melé, “Organizational Humanizing Cultures,” 6. 414 Melé, “Organizational Humanizing Cultures,” 6. 415 Melé, “Organizational Humanizing Cultures,” 5. 416 Melé, “Organizational Humanizing Cultures,” 7.
A Person-Centered Managerial Paradigm for the Workplace
345
of a common good – having self-interest identical to the larger group interests. Therefore, a
humanizing culture will not subordinate the common good and tries to satisfy both self-interest and
common organizational goals and interests. All these features hold fast and deeply fasten to the
already discussed characteristics of LVM and the self-regulating or self-monitoring approach
discussed in previous sections.
Melé observes, in this regard, that the organizational humanizing culture creates “social capital” in
the organization.417 Social capital is defined as “the resource available to actors as a function of their
location in the structure of their social relations.”418 In the organizations, social capital is invested
through the relational activities of generating connections, enabling and sustaining trust and fostering
and empowering cooperation. Melé, referring to Carrie R. Leana and Harry J. van Buren III, writes
that trust and associability generate social capital in an organization, and that both of these function
within the “willingness and ability of participants in an organization to subordinate individual goals
and associate actions to collective goals and actions.”419 He thus regards trust and associability as the
major components of social capital. In the same way, in reference to social capital in organizations,
Melé quotes Don Cohen and Laurence Prusak, who write that “social capital consists of the stock of
active connections among people: the trust, mutual understanding, and shared values and behaviours
that bind the members of human networks and communities and make cooperative action
possible.”420 Hence, social capital consists in the ability and willingness of employees to work
together in organizations, even at the cost of personal interests, for common goals and purposes.
Trust and associability are the two key factors to enable cooperation, cooperation builds social
capital, and this in turn fosters organizational humanizing cultures – and vice versa. This generates
the organizational identification we have discussed in previous sections.
Melé is also concerned about the dehumanizing culture produced through disloyalty, “unfair
treatment, lack of respect for people and unconcern for the community needs.”421 This culture
weakens trust and employees willingness to cooperate, and thus also associability. Lack of respect
for the dignity and humanity of each individual leads to antisocial behaviour in organizations,
endangers social capital, and further destroys the productivity, profitability, expansion and endurance
of an organization. Thus, Melé opposed performance-dominated cultures, which disdain concern for
people, and argues instead for a ‘citizenship behaviour’ that goes “beyond the role requirements, that
are not directly or explicitly recognized by the formal reward system, and that facilitates
organizational functioning.”422 We have already discussed this advantage and the requirements of
citizenship behaviour in the organization formed through care, trust, commitment and organizational
identification. The dimensions of trust, loyalty, commitment and identification, along with
recognition and respect for individuals’ dignity and rights, seem to play the major roles in
417 Social capital could be an asset in the organization derived through the relationships among individual
employees, employers and other groups within it and includes outside networks or societies, which can enable
profits just as physical (equipment) or human (knowledge) capital. Melé, “Organizational Humanizing
Cultures,” 7. Many studies have explored how social capital facilitates resource exchanges and product
innovations, team effectiveness, workers satisfaction, etc. Cf. Adler and Kwon, “Social Capital: Prospects for
a New Concept,” 17. 418 Adler and Kwon, “Social Capital: Prospects for a New Concept,” 18. 419 Carrie R. Leana and Harry J. van Buren III, “Organizational Social Capital and Employment Practices,”
Academy of Management Review 24, no. 3 (1999): 541. Cf. Melé, “Organizational Humanizing Cultures,” 8. 420 Melé, “Organizational Humanizing Cultures,” 8. Cf. Don Cohen and Laurence Prusak, In Good Company:
How Social Capital Makes Organizations Work (Boston: Harvard Business School Press, 2001), 4. 421 Melé, “Organizational Humanizing Cultures,” 10. 422 Melé, “Organizational Humanizing Cultures,” 10. Cf. Mark C. Bolino, William H. Turnley and James M.
Bloodgood, “Citizen Behaviour and the Creation of Social Capital in Organizations,” Academy of
Management Review 27, no. 4 (2002): 505-522.
A Person-Centered Managerial Paradigm for the Workplace
346
organizational humanizing culture and the creation of social capital. This makes clear that a
humanizing or rehumanizing culture in an organization leads to the creation of social capital, and
vice versa.
7.4.4 Human Quality Treatment (HQT) in the Workplace: A Personalist Review
Human quality is given predominant consideration in dealing with people in organizations from a
personalist perspective. In fact, the measured quality of any business processes, service or end
products is linked, directly or indirectly, to the capacities of employees and how they are managed
or treated in organizations. Melé observes that although managing human quality is not common in
managerial literature and discourses, several concepts apparently discussed in management are
linked to it, such as respect for human dignity and individual rights, “inhuman” treatment and
practices in the workplace and in business, fair treatment, and freedom or bondage in labour
relationships, etc.423 Referring to several management literatures, Melé illustrates several antecedents
dealing with human quality. For instance, he first refers to the Human Relations Movement, which
argues that “human beings are more than interchangeable parts within an organization.”424 It is
observed that employee efficiency and productivity is improved when organizational or workplace
management considers employee feelings and attitudes, going beyond mere technology, its methods
and processes.425 This runs against the conventional mechanistic outlook of the organization,
proposing a deeper understanding of the human being.
A second antecedent related to human quality in the workplace is the Quality of Working Life (QWL)
that seeks, along with job satisfaction, the well-being of employees.426 It promotes peer relationships,
job-satisfaction, reduction of stress, etc. QWL is defined as “the quality of the relationship between
employees and the total working environment, with human dimensions added to the usual technical
and economic considerations.”427 It also witnesses that the satisfaction of employees is linked to and
improves the quality of products and services and thus increases the profitability of the organization.
A third antecedent could be a summarized form of organizational justice (treating employees in
terms of justice and fairness) and the quality of management of work (an appropriate treatment of
employees considering the organizational ethical culture).428 According to Melé, appropriate
treatment of employees includes “[an] ‘intrinsic motivation’ (motivation for the work itself)
‘organizational commitment’ (attitudes of people toward the organization’s values and goals), and
‘corporate citizenship behaviour’ (individual behaviour not directly or explicitly recognized by the
423 Domènec Melé, “Human Quality Treatment: Five Organizational Levels,” Journal of Business Ethics 120,
no. 4 (2014): 457. 424 Melé, “Human Quality Treatment: Five Organizational Levels,” 458. Cf. Elton Mayo, The Human Problems
of an Industrial Civilization (Salem, NH: Macmillan, 1933). George Elton Mayo started the Human Relations
movement to explore the link between employee well-being and workplace productivity. His experiments
show the increase of productivity when employers are interested in employees’ psycho-social and natural
needs and satisfaction. It could be a counterpoint to the mechanistic view of managing employees stated by
Taylorist scientific management. 425 Melé, “Human Quality Treatment: Five Organizational Levels,” 458. 426 Melé, “Human Quality Treatment: Five Organizational Levels,” 458. Cf. Richard E. Walton, “Improving
the Quality of Work Life,” Harvard Business Review 52, no. 3 (1974), 12-155. The QWL seeks the overall
or focus on employees as persons with values and dignity and their worklife, not mere the act or the work
done by the employer. Employees’ holistic well-being must also be the concern of employers, not just what
is related to work and the situational outcome. 427 Melé, “Human Quality Treatment: Five Organizational Levels,” 458. Cf. Louis E. Davis, “Design of New
Organizations,” in The Quality of Working Life and the 1980s, eds. Harvey Kolodny and Hans van Beinum
(New York: Praeger, 1983), 65-86. 428 Melé, “Human Quality Treatment: Five Organizational Levels,” 458.
A Person-Centered Managerial Paradigm for the Workplace
347
formal reward system, which contribute to a better performance).”429 Along with these dimensions,
Melé considers spirituality in the workplace also as relevant in the discussion of human quality in
the organization.
All these factors concerning the individual and social ethical climate of organizations, have been
discussed in previous sections. Melé, likewise, states that ethical theories such as contractarianism,
deontology, virtue ethics and ethics of care and responsibility are implicitly related to the notion of
human quality.430 For considering the ethical challenges in labour relations and employee
management today, notions such as “the rights of employees versus property rights, employee
privacy and monitoring, whistle-blowing, pay equity, discrimination, employee safety, unions, and
minimum labour standards,”431 etc. give respect to human rights, that entails in turn respect for
persons and their dignity. Besides, according to Melé, human virtues support employees in their
effort to act humanly, which also lead to the ethics of care and responsibility, which concentrate on
concern for the other. However, the Person-Centred approach focuses closely on human treatment.
It is because of its central theme that “persons should be treated not only with respect, but also with
benevolence and care.”432 It looks for a humanistic management to enable an integral human
development.
The notion of quality is conceptualized as excellence according to certain standards. Melé is aware
that the richness of human nature makes it difficult to propose a standard for human quality.
However, investigating what is appropriate for human conditions, he tries “to identify some basic
ontological characteristics of the human being and their implications for an appropriate treatment of
humans.”433 For instance, rationality, the intellectual capacity to understand the self, the other, and
the external world, is the first ontological character Melé notes in discussing the human condition.
Reason helps us to realize inner privacy, intimacy, and self-determination. He speaks about the
emotions and sentiments that stimulate desires in humans and motivates them to act. However, in his
opinion, “rational deliberation combines with self-determination and permits one to decide whether
or not to respond to a stimulus, or to choose between several alternative courses of action.”434 This
means that a spontaneous motivation combined with rational choice enables one to choose the act
most conducive to human growth. Relationality, the capacity to share and “establish relationships
with other personal beings and to enrich his or her character and personhood through such relations,”
as well as sociability, “a tendency to live together,” are other significant ontological characteristics
of human beings appropriate for human conditions.435 However, this does not forsake the uniqueness
of human being, which is not only genetical “but also in the awareness of the self in his or her interior
world and intimacy.”436 All these characteristics mark the human conditions for appropriate
treatment.
These specific human characteristics demonstrate the intrinsic worth of human beings and their right
to be treated with respect and with recognition of their personhood. Human quality is endowed with
429 Melé, “Human Quality Treatment: Five Organizational Levels,” 459. 430 For instance, the Integrative Social Contract Theory derives morality form “a combination of “hypernorms”
(fundamental principles discernible in a convergence of religious, political, and philosophical thought) and
“authentic norms” (generated within a community’s free moral space).” According to Melé, human quality is
highly valued here. Melé, “Human Quality Treatment: Five Organizational Levels,” 459. 431 Melé, “Human Quality Treatment: Five Organizational Levels,” 459. 432 Melé, “Integrating Personalism into Virtue-Based Business Ethics,” 232. Melé, “Human Quality Treatment:
Five Organizational Levels,” 460. 433 Melé, “Human Quality Treatment: Five Organizational Levels,” 461. 434 Melé, “Human Quality Treatment: Five Organizational Levels,” 461. 435 Melé, “Human Quality Treatment: Five Organizational Levels,” 461. 436 Melé, “Human Quality Treatment: Five Organizational Levels,” 461.
A Person-Centered Managerial Paradigm for the Workplace
348
human conditions of innate dignity and rights and treating them as rational free beings with
relationability and sociability.437 These aspects of persons must be the subjects of appropriate study.
Therefore, it requires “a sensitivity and care for people’s legitimate interests and real needs” and
termed as “authentic care” with a “discernment through practical wisdom […] along with legitimate
interests.”438 Human Quality Treatment, thus deals with “persons in a way appropriate to the human
condition, which entails acting with respect for their human dignity and rights, caring for their
problems and legitimate interests, and fostering their personal development.”439 To manage people
in organizations, Melé distinguishes five levels of Human Quality Treatment (HQT), including
maltreatment, indifference, justice, care, and development.440 Let us briefly explain each of these in
line with employee management and organizational behaviours in the organizations.
Maltreatment, the lowest level of HQT, represents the “blatant injustice through abuse of power or
mistreatment”441 and includes exploitation and treatment of people in harmful or offensive ways in
the context of the organizational workplace. It is the abuse – exploitation – of any person in the
organization. There could be maltreatment by both commission and omission. Second is the level of
indifference, displaying a “disrespectful treatment through lack of recognition of their personhood
and concern.”442 It could be an invisible maltreatment – a subtle form of injustice – within the
organization that happens even when one feels abiding by the law. For instance, not giving due
respect to the human dignity that each employee possesses. Justice is the third level characterized by
respect for persons and their rights.443 Here the intrinsic dignity of each person is recognized, but
with strict rule of justice, giving merely what is due. Along with veracity, fairness in words and
actions is valued and expected in all dealings with employees. According to Melé, equity is very
significant in this level of human quality and goes against favouritism or nepotism.444 The fourth
level, care goes beyond justice and expresses “concern for people’s legitimate interests and support
to resolve their problems.”445 This level of human quality encourages people to understand the
vulnerability of each member and act with empathy, compassion and emotional intelligence.446 The
notion of care entails ethical requirements, so as not to provoke some injustice due to the hold of
illegitimate sentiments. Melé, thus, speaks here about authentic care, which is a “pre-occupation for
437 Melé, “Human Quality Treatment: Five Organizational Levels,” 462. When a personhood of an individual
is not recognized, it goes against his or her worthiness. Domènec Melé, Management Ethics: Placing Ethics
at the Core of Good Management (New York: Palgrave MacMillan, 2012), 28-29. 438 Melé, “Human Quality Treatment: Five Organizational Levels,” 462. 439 Melé, “Human Quality Treatment: Five Organizational Levels,” 462. 440 Melé, “Human Quality Treatment: Five Organizational Levels,” 462-466. 441 Melé, “Human Quality Treatment: Five Organizational Levels,” 463. It includes improper usage of people,
mismanagement of authority and confidence leading to authoritarianism and the consequent aggression in
words and deeds, psychological and sexual harassment, instilling fear and anxiety, unfair discrimination,
violation of basic human rights such as privacy, autonomy, and freedom. 442 Melé, “Human Quality Treatment: Five Organizational Levels,” 463. Employees are seen as mere resources,
only means, not an end. Not having sensitivity towards people, treating employees with suspicion, acting
without due respect, disregarding employee’s capabilities, etc are few examples of indifference in the
workplace. 443 Melé, “Human Quality Treatment: Five Organizational Levels,” 464. Over against the abuse of power as in
the maltreatment, “justice demands a proper exercise of power in dealings with people.” 444 Melé, “Human Quality Treatment: Five Organizational Levels,” 464. 445 Melé, “Human Quality Treatment: Five Organizational Levels,” 464. 446 Melé, “Human Quality Treatment: Five Organizational Levels,” 464. Emotional intelligence is defined as
“the ability to perceive emotions, to access and generate emotions so as to assist thought, to understand
emotions and emotional knowledge, and to reflectively regulate emotions so as to promote emotional and
intellectual growth.” John D. Mayer and Peter Salovey, “What is Emotional Intelligence?” in Emotional
Development and Emotional Intelligence: Educational Implications, eds. Peter Salovey and David J. Sluyter
(New York: Basic Books, 1997), 5.
A Person-Centered Managerial Paradigm for the Workplace
349
others, but with discernment.”447 The concern of justice is emphasized here again. We have already
discussed the need to combine justice and care in dealing with employees.
The fifth level of human quality is development, “favouring people’s human flourishing, mutual
esteem, and friendship-based reciprocity.”448 Along with justice and care, this level of human quality
shows “a real esteem for others in their wholeness, and acting with a sense of service and cooperation,
providing an appropriate participation, and fostering in collaborators the acquisition of professional
competences, including those which are moral in nature.”449 This level tries to create and engage in
a virtuous circle of human flourishing through cooperation and willingness to serve the development
of other persons in the organization. Promoting what is best for each one in the organization, a
reciprocal influence and mutual esteem and respect are developed. Melé brings here a “friendship-
based reciprocity,” generated through the flourishing of each member in the organization by the
mutual concern and esteem each has for the others.450 The maximisation of capabilities and mutual
encouragements leads employees to recognize themselves as active subjects or participants in their
organization, as well as co-responsible in achieving its goals. Thus, human quality treatment nurtures
mutual dealings with respect and authentic care, fosters development, and expresses engagement or
treatment appropriate to the human condition in organizations. It also helps in reflection on how to
manage employees and rehumanize the workplace.
7.5 CONCLUSION
In many organizational contexts, electronic surveillance in the workplace is today part of a
management strategy established by authorities to achieve its objectives. The biggest constraint of
this articulation is that this management model empowers a few but disempowers the many who are
closely related to the organization. Employees demonstrate altered behaviours due to ubiquitous
monitoring and bear the subsequent socio-economic, psychological, and ethical effects. The
individual application of different management models does not produce the expected result in a
given situation, and thus a new system of behaviour in the workplace is needed. Moreover, given the
growing ubiquity of monitoring, its socio-economic, physical, psychological, and ethical effects on
employees, and the long-term adverse alterations in employee behaviour, what is required is a model
that respects both individual and management rights and avoids any kind of discrimination and
unequal power distances. This chapter, after critically analyzing the major management theories and
approaches, has sought to articulate the growing necessity of a new employee management paradigm
that best fits modern organizations. An adequate integration of faith reflections and spirituality and
that of Catholic Social Teaching in particular, to a person-centered humanistic understanding has
been expounded here in brief. The proposed approach of labourer valued management (LVM) and
its responsible task of self-monitoring or self-regulative practice promises to foster a new
understanding of workplace management.
LVM values the dignity of the human person in its entirety and thus the subjective dimension of
work. The factor of corporate citizenship is very significant and is immersed in the LVM to enable
it to develop an individualized analysis of employees and management and highlights a combination
of the transactional, participatory, and recognition ethics of business. Through a continued process
of organizational justice and organizational identification, LVM stands for rehumanizing the
workplace, such that every individual is regarded worthy of self-esteem without any discrimination
447 Melé, “Human Quality Treatment: Five Organizational Levels,” 465. 448 Melé, “Human Quality Treatment: Five Organizational Levels,” 465. 449 Melé, “Human Quality Treatment: Five Organizational Levels,” 465. Cf. Melé, Management Ethics:
Placing Ethics at the Core of Good Management, 132-133. 450 Melé, “Human Quality Treatment: Five Organizational Levels,” 465.
A Person-Centered Managerial Paradigm for the Workplace
350
or subordination. This approach acknowledges that corporations not alone are responsible for their
social and ethical behaviour, but all their members have a capacity and responsibility of mutual
reinforcement. In the same way, employees desire more freedom and autonomy and less external
monitoring and control and oppose ubiquitous surveillance in the workplace as it functions
detrimentally with employees’ efficiency and productivity and moral behaviour. Self-monitoring is
an effective alternative to electronic monitoring and is likely to satisfy both employers’ interests –
vision or objectives – and employees’ rights and interests, such as privacy and fair and impartial
treatment. It qualifies and empowers social interaction within the organization through personal
charisma and social sensitivity and adaptability. Thus, employees demonstrate a responsible and self-
regulated commitment and dedication to the improvement of the organization by a self-motivated
compliance with all its rational, judicial and impartial legal mandates and develop a normative and
ethical corporate conduct and behavioural patterns to ensure fairness and justice in the workplace.
The integration of personal and social normative concerns along with the domains of legal and moral
values into organizational behaviours and decision-making and to the pursuit of social responsibility
all create, in turn, a ‘corporate conscience’ that promises to benefit all participants or stakeholders
concerned.
Management practices face unprecedented challenges today and the same is true of workplace
surveillance as a management strategy. Lack of transparency, increasing suspicion and the
continuous decline in trust among organizational and corporate members all threaten the normal
functioning of any business. Management strategies informed solely by economics make employees
into materialistic utility maximisers, and the human concerns of respect, dignity, human rights, self-
actualization, community, shared values, mutual relationship, etc. are put at risk. This situation leads
to create an integrated management form of values, principles and virtues. Thus, we have a person-
centered approach in management that seeks to integrate goods (values), ethical norms and
principles, and virtues (human nature and character). This approach “focuses on human persons – in
their individual and social dimensions – stressing human dignity, human rights, benevolence and
caring for people, along with the common good of human communities.”451 Although for moral
judgements of any action it considers circumstances and consequences, its ultimate goal is human
well-being and flourishing. It brings forth a sense of belongingness by regarding the workplace or
organization as a community of persons joined together for individual and organizational
development. Hence, reflecting on the notion of workplace surveillance as a management strategy
used to control employees, and considering its impacts on employees’ life chances, we have here
proposed a new humanistic management alternative – a person-centered approach – that takes into
account the “whole life” of employees.
451 Domènec Melé, Business Ethics in Action: Seeking Human Excellence in Organizations (London: Palgrave
Macmillan, 2009), 74.
GENERAL CONCLUSION
Work is about a search, too, for daily meaning as well as daily bread, for recognition as well as
cash, for astonishment rather than torpor; in short, for a sort of life rather than a Monday through
Friday sort of dying. Perhaps immortality, too, is part of the quest.1
We started this study of workplace surveillance from the observation that human life, with its values
and characteristic behaviours, has undergone a shift due to the unprecedented spread of information
technology and advent of computers and related devices. Technology continues to advance today,
with an all-pervading capacity. This advancement provides boundless opportunities for a better
world. These mechanisms have had both benefits and detriments in various realms of society, as we
have seen. Especially the massive use of electronic surveillance apparatuses in the workplace today
jeopardizes the protection of individual rights and the safeguarding of personal information, space
and time. Despite the conviction of business ethicists that the workplace is meant to be a major locus
of human interaction and growth, the advancement and widespread use of information and
communication technologies, have in more than one way had a negative effect. For instance, while
technology aims to make communication more efficient and effective, it also negatively affects the
relationship between employers and employees and creates tension and distrust in an organizational
context. Within the research context of this study, we have seen how these technologies have made
extensive employee monitoring and surveillance possible – inexpensive, pervasive and invasive –
with psychological, socio-cultural and economic effects.
This shows that workplace surveillance and employee monitoring is a common reality with nuanced
implications and is a field of multiple conflicting rights and practices. While technological
surveillance in the workplace can bring benefits to an organisation, such as promoting security,
exposing dishonest workers, enabling efficient communication, expanding networking opportunities,
and being as a cost-efficient means of storing data, its impact on employees seems less positive. It
affects workers negatively and hinders their productivity and satisfaction at work. For instance, this
research, in line with several other researchers, demonstrates that within the context of workplace,
both ICT-enabled surveillance practices and the big data revolution they have brought about today
have concerning implications for individual privacy, the protection of human dignity, power control
and distance, human autonomy and freedom, and social justice.2 Researchers such as Michel Anteby
and Curtis K. Chan state that “employers may be unaware that the effects of surveillance may go
well beyond the initial, and often relatively innocuous, reason they chose to monitor employees.”3
Given practices of monitoring in the workplace, the question of how an individual or organization
can establish acceptable limits on such intrusiveness has become a big issue and is increasingly
debated. Its acceptance or rejection depends largely upon how one answers questions in a range of
categories, such as who is performing the surveillance (agent), why it is being done, and how it is
being done. As few researchers4 have studied the ethical implications of electronic surveillance in
1 Timo Jütten, “Dignity, Esteem, and Social Contribution: A Recognition-Theoretical Views,” The Journal of
Political Philosophy 25, no. 3 (2017): 266. Cf. Studs Terkel, Working: People Talk About What They Do All
Day and How They Feel About What They Do (New York: Free Press, 1974), 1. 2 Torin Monahan, “Built to Lie: Investigating Technologies of Deception, Surveillance, and Control,” 229. Cf.
Vincent Mosco, To the cloud: Big Data in a Turbulent World (New York, NY: Paradigm, 2014); David Lyon,
Surveillance after Snowden (Malden, MA: Polity, 2015); David Lyon, “Surveillance, Snowden, and Big Data:
Capacities, Consequences, Critique,” Big Data & Society 1, no. 2 (2014): 1-13. 3 Michel Anteby and Curtis K. Chan, “Why Monitoring Your Employees’ Behaviour Can Backfire,” Harvard
Business Review, April 25, 2018, https://hbr.org/2018/04/why-monitoring-your-employees-behavior-can-
backfire [accessed October 20, 2018]. 4 Jonathan P. West and James S. Bowman, “Electronic Surveillance at Work: An Ethical Analysis,”
Administration & Society 48, no. 5 (2016): 628.
General Conclusion
352
the workplace, this research has asked not only whether companies use modern technologies to
monitor and control employees, but how this surveillance is currently implemented and what
detrimental effects it has on employees.
GENERAL OBSERVATIONS
The tendency of researchers to overlook the ‘ethical’ in studies of workplace behaviour necessitated
this research and eventually benefited it in two ways: on the one hand, it has identified the best
managerial and behavioural patterns in the workplace, and on the other it has helped to fill a lacuna
in the scholarship. Clearly, surveillance is more than just an effort to improve efficiency. Its current
practice invites one to confront and challenge the basic reasoning behind its very existence. It was
critically important, therefore, to balance the legitimate desire to safeguard organizational interests
and equally legitimate human concerns to protect employee privacy, dignity and social status. Thus,
our research revolved around the primary question of how the use of electronic surveillance in the
organizational workplace imperils the individual rights of employees, does more harm than good,
and has significant socio-economic effects and implications for how we assess the current employee
management paradigm. To answer this question, this study has taken into account both the individual
rights perspective and the social justice perspective and proposed a new more favourable
management paradigm for understanding the workplace.
To this end, this study has combined descriptive and theoretical analysis and in this way identified,
on a conceptual basis, some of the underlying surveillance frameworks. It has also examined a
number of current technological devices and methods used in the workplace. Surveillance is
positively regarded as a management technique useful to ensure quality service and increase
productivity, as well as being a guarantee against theft, legal trouble and overexpenditures due to
fraud, dishonesty, or misconduct. It is also thought to offer an objective and fact-based basis for
feedback and performance appraisal. However, our critical analysis of this practice in this study has
brought to light certain forgotten issues and shown that the individual, social and ethical concerns
raised by employees about these practices outweigh their benefits.
THE FACTS: NEGATIVE CONSEQUENCES FOR PEOPLE IN THE WORKPLACE AND THEIR
RESPONSE TO THESE
A thorough inspection of electronic workplace surveillance in the Indian socio-cultural and economic
context has shown that such practices are undertaken for reasons of power control and power
distance, not only for general causative factors of quality management and performance attributes as
is often said. Here it is also discovered that the lack of constitutional and legislative security over
surveillance and individual rights greatly exacerbates workplace bullying as well as employee
mechanization and dehumanization. Two key competing consequences of workplace surveillance –
privacy and social distance – are investigated further and shown to expose the deeply rooted socio-
ethical paradox of surveillance technologies. These enumerations have opened a new avenue of
investigation, consisting of human rights and social justice. It has showed that new technological
developments in the workplace have led to a diminution of privacy, bringing a kind of Big Brother
into the office in an all-too obvious way. This study has also demonstrated that employee privacy
rights, the protection of which is a prerequisite for safeguarding and preserving the individuality and
dignity of employees, are often violated, creating problem of social justice. Thus, our discussion
moved from a focus on individual rights (privacy – be oneself) to social problems (social sorting –
creation of inequality and power control – subjecting people) and was shown to have clear ethical
implications.
General Conclusion
353
Our empirical study has demonstrated that the negative impacts of workplace surveillance surpass
its expected benefits. It has ascertained that employees have totally different attitudinal and
behavioural positions according to whether or not they are under surveillance. The inadequacy of
workplace monitoring in achieving long term goals and objectives has also been empirically
explored. We have seen that this qualitative affirmation that the negative impacts of workplace
surveillance surpass its expected benefits calls for an adequate ethical response and new management
strategy. To understand the moral rules at stake and respond ethically to workplace surveillance, this
research has proposed a new management strategy that goes beyond merely managerial rationality.
It has argued for an ethical culture that protects, legally and morally, human life in any work context
and integrates social, professional and personal ethos into workplace behaviour. All judgements and
organizational behaviour in general have been shown to be manifestations of this tripartite ethos.
The religious vision of individuals has also been seen to transform a technocratic mentality in the
workplace into a new attitude of profound human concern. Thus, our proposed strategy seeks to re-
establish the forgotten human aspect of employees by reclaiming the neglected fact of the
irreducibility of persons, and it has done so through the ethical analysis of rights, dignity, power and
social justice. In our time, it is more important than ever to give a significant place to employees,
valuing and treasuring each one’s dignity, autonomy and uniqueness as a human person.
Keeping in mind this propensity for valuing the ‘human’ aspect of employees and need to uphold
employee respect and esteem, we have proposed a new strategic management framework within the
context of workplace surveillance. This study has prioritized an integrative ethical and personalist
model known as Labourer Valued Management (LVM) and tried to reconstruct ethical behaviour in
the workplace by integrating a passionate human strategy with a life-centered ethics that values the
subjectivity of work and the dignity of the human person in its entirety. This constitutes a responsible
practice of self-monitoring or self-directed regulative practices as a human development approach
that complements person-centered or labourer valued management.
OTHER INSIGHTS FROM THIS RESEARCH
The advancement and convergence of computer-internet technologies within the workplace has given
rise to new methods for surveillling people as citizens, workers and consumers. This has had dramatic
effects on our society per se. It has promoted a ‘culture technique’ of human life. Along with the
consequent acceleration of material improvements and new opportunities for work performance and
security, it has led to employee degradation and had other unintended social and ethical implications,
leading to a paradox of technological development. As an observation from a distance, it directs one
in the end to the individual himself. It influences a person’s life with surreptitious investigations into
routine activities and workplace behaviours. It is called a ‘double-edged sword,’ carrying baggage
as well as benefits. Several factors – continuous and easy monitoring of employees, technological
over-dependency, power control and inequality in contractual relationships – have shifted the focus
in the workplace today from ‘monitoring work’ to the ‘surveillance of workers,’ demanding a
transformed management strategy. This practice of direct or ‘panoptical’ control over workers rather
than over the work itself has a kind of drilling effect – an effect of psychological torture – on
employees. It has been called the ‘electronic panopticon,’ where a disembodied eye overcomes the
constraints of architecture, space and time.
The rigid system of surveillance in the workplace is ruthless. It binds employees to their machines
and ranks them almost as ‘cyborgs’ – welded to their workstations and having little or no autonomy.
Employees in turn fall victim to the institutionalized acceptance of management prerogatives and
managerially imposed and intensified control systems. This has resulted in a new degree of regulation
General Conclusion
354
of employees’ identities and subjectivities, as we have seen, leading to increased mechanization and
dehumanization. Perhaps the most novel contribution of this research is its identification of a ‘social
sorting’ mechanism as a consequence of workplace surveillance. The concept of social sorting makes
clear the tendency of contemporary surveillance to sort people into various categories for assessment
and judgement. This process of sorting employees is now virtual. It is done by assigning categorical
descriptions of ‘worth’ or ‘risk’ to employees in ways that have real effects on their life-chances.
The phenomenon of sorting also affects employees by giving them an experience of arbitrariness,
being treated in certain ways just because they belong to certain groups, as well as by challenging
their human relationships through a new prominence of disembodied information. Employee
classification happens according to their relative worth, and thus individuals or groups that are most
likely to be valuable – the creamed-off-categories – receive superior services. Though categorization
seems to be an endemic part of social life today and even a condition of certain forms of social
progress, it can also lead to adverse social stratification – a ‘digital redlining’ or weblining – and
have unfair and unjust social effects. So-called ‘marginal’ or ‘dangerous’ people or groups, often
profiled in terms of probabilities and future possibilities, always remain under the gaze and scrutiny
of the invisible and the powerful. This endorsed stigmatization of employees has intensified
exclusionary strategies in the workplace, where one can say that all are thought to be potentially
‘guilty’ unless systems say otherwise.
The ability to monitor employees at a distance has raised the issue of disappearing bodies and has
led to a disembodiment of human relations. Physical bodies are transformed, in our experience, into
digital codes, and there emerge new bodies made of mere information – a kind of personification of
information. When abstracted from a territorial setting and represented only through data flows, an
observed body becomes a fragmented, decorporalized body; a ‘data double’ of pure virtuality.
Human beings thus degenerate from being ‘bodies’ to being merely ‘matter’ to be examined and put
on display. Contemporary surveillance, as we have seen, is based more on abstractions than on
embodied persons; it makes no reference to living people, but only to the data representing them.
This phenomenon, as this study has shown, reconfigures how social relationships are fostered,
leading to a disembodiment of social relationships.
The logic behind workplace surveillance is the operation of power ‘at distance,’ expressed physically
and institutionally. In the same way, surveillance is now about a ‘remote-world’ and ‘remote
relations’ where there is no room for personal engagements or even the co-presence of embodied
persons. The electronic mediation of abstract data representing social persons fosters a ‘facelessness’
of individual employees recognizing the ethical concern of the ‘irreducibility of the person’ within
the framework of the ethics of big data and the embodied subject. Similarly, in present digital
surveillance the experience of ‘being watched’ is highly gendered and charged with a certain
voyeuristic motive, only increasing the ‘being-looked-at-ness’ of women. The pernicious tendency
of the surveilling gaze to turn the body into a sexualized object reproduces the sexualization of
women who are made the victims of this digital ‘Peeping Tom.’
Another theme identified in this study is the manipulation of data to secure a desired outcome and
normalize ‘a way of being.’ This is done by direct controlling systems that reconstruct and reshape
the ideological values and preferences of their targets. The enforcement of the blind obedience of
employees to the authority has disempowered employees and led to a ‘commodification’ of labour.
It has triggered ‘reciprocal deviances’ such as production deviance (counterproductive behaviours),
employee-shirking behaviours, opportunistic acts, impression management tactics, an intentional
reduction of effort, etc., and it has curtailed ‘above-and-beyond’ (extra-role) behaviours. This ‘digital
captivity’ or ‘digital domination’ has been identified in the Indian context as part of a hidden
General Conclusion
355
apartheid – the maltreatment of employees in a polished, respectable form. This mechanism leads to
job-dissatisfaction and thus to employee turnover, job-attrition, absenteeism, presenteeism, job-
abandonment and less favourable organizational citizenship behaviours overall. It can also lead to
occupational violence and anti-social behaviours. Other workplace variables such as trust,
commitment, efficiency and performance, we have seen, do not depend on external electronic
monitoring. Ubiquitous surveillance, according to the direct employee experience, does not help to
achieve long term objectives. It is not recognized as a significant factor in productivity and thus is of
little help in resolving workplace problems.
ETHICAL EVALUATION
Our analysis has led to an ethical reconsideration of electronic surveillance in the workplace. To
develop a well-defined workplace surveillance ethics and ethical response to workplace surveillance
is, however, a herculean task. For if one applies a few guidelines in one context to ensure that an
action is ‘ethical,’ these guidelines may not be applicable to a different context and thus become
inadequate. They may also leave out nuances of the problem related to justice and social relations. It
is conceded, therefore, that we need a movement from managerial rationality to a paradigm that
makes central a real concern for employees as human persons, not as machines, things to be used, or
data to be analysed. Managerial rationality, a purposeful, goal-directed ideological construct for the
sustainability of the organization, tend to consider employees as machine implementing a power-
centered management paradigm. Variables like ‘reasonable moral behaviour’ and ‘reasonable
conduct towards other’ demand a shift beyond managerial rationality to a dynamic field of human
interaction and hence an ethical rationality.
Religion also plays an important role in shaping ethical rationality. For organizational values and the
resultant ethical behaviour is often an extension of individual morals and norms developed through
religious systems and spiritual practices. Religion also helps to transform a technocratic mentality
into a deep human concern in the workplace. Moreover, the role of religion on value discourse of
any kind in organizations functions as a latent variable that shapes and informs individual and social
ethics.
From a results-oriented perspective, constant surveillance in the workplace becomes a threat
(physical, moral, psychological, and behavioural impacts) and assaults individual rights (lack of
freedom and autonomy, privacy invasion, disregarding employees as autonomous moral agents).
Thus, from an employee perspective, workplace surveillance is an unethical managerial practice that
must be altered and transformed. Similarly, it is observed from a rule-based perspective that
continuous or pervasive surveillance in the workplace creates and perpetrates inequality, treats the
body (employee) as an object to be watched (the problem of voyeurism), and thus leads to a violation
of the socio-ethical rights of employees.
The major problem identified here is the subjective dimension of labour turning into the merely
commodified version noted above. Likewise, a virtue-oriented perspective reminds us that
employees, when subjected to ubiquitous surveillance, often fail to act in accordance with their own
true selves and even sacrifice their personal integrity. This failure in the workplace may even lead
one to engage in a situation with “adaptive behaviours” through a provisionally “manufactured” self.
This anticipatory conformity to another’s will leads to final self-subordination. Therefore, analysing
these perspectives, we have seen that electronic monitoring systems challenge and threaten the
‘human’ aspect of employees and thus compromise their work-quality and work-ethics.
General Conclusion
356
This research has also exposed the ontological insecurity that one feels in the workplace, beyond the
safety and security claims of surveillance advocates. The tripartite ethical discussion of rules, results
and virtue-based analysis holds that ubiquitous surveillance practices in the workplace, implemented
as part of managerial practices and strategies, violate basic individual rights and the requirements of
social justice and thus are unethical and unfair. Employee perspectives on workplace surveillance
and reactions to it as well as our consideration of its individually and socially detrimental effects
have demonstrated the same. Likewise, this research has established that employers who act only
according to managerial rationality, forgetting the above mentioned ‘human’ aspect of employees
and disregarding the influence of individual ethical reasoning, will limit pro-employee behaviours.
Therefore, it is observed in the strict sense of employee perspective that external electronic
surveillance is not likely to increase productivity or efficiency in the workplace; rather, respect for
employee autonomy and freedom combined with self-control and responsibility are more likely to
achieve this result. This made clear the need to respect the dignity of each employee as human person.
Individual ethical behaviour is here seen to be the starting point for organizational ethical behaviour.
THE ALTERNATIVE: TWO MODELS
These findings have led us to propose a different modus operandi in the workplace and in employee
management, implying alterations in the commonly practiced control-based organizational
development approaches, starting from a person-oriented approach and focusing on institutional
aspects. Hence, the newly introduced strategic management model of workplace surveillance,
namely “Labourer Valued Management” (LVM), reconstructs ethical behavior in the workplace
within the framework of a person-centered approach. This person-centered approach prioritizes the
humanness of employees without disregarding the role of principles and norms of good behaviour.
It emphasizes the uniqueness and inviolability of employees as persons essentially within their
relational or communitarian dimensions. Thus, it reacts to the sorting or discriminating mechanism
of surveillance and reductionistic tendencies of materialistic ideologies of the modern era placing at
its center the value of the person’s subjectivity, autonomy, dignity, participation and solidarity.
A transformative perception of the organization as a living-system (not as machine) becomes a
starting point to adopt a person-centred approach. This progressive and transformative discernment
brings into the organization a purposeful organization model (purpose-led organization) and the
consequent sustainable human resource management approach (Sustainable HRM). The ‘purpose’
becomes a strategic anchor within the organization considering all stakeholders. It promotes a moral
self (identity) to function and manage embodying the culture of the organization and the character of
its employees (configuring individual character with organization’s purpose). In this line, employee
management is triggered to concentrate on human sustainability (considering employees as
significant assets) to intensify a regenerative relationship between employees and organizations and
thus to achieve positive human or social outcomes. Employee well-being (against the instrumental
view on employees) is a significant dimension of sustainable HRM leading to a work-life balance.
Labourer valued management, as the child of a person-centered approach, integrates a passionate
managerial strategy with a life-centered ethic and shifts the discussion from ‘techno-mode’ to
‘human-mode,’ focused on employees’ dignity, rights and justice. This approach increases the
employee value in each context of conflict and encourages organizations to pursue employee-friendly
behavioural policies from the employers’ side to avoid losses of confidence and trust on the
employees’ side. Model 1 shows the formulation and the major contributors of LVM.
General Conclusion
357
Model 1 - Formulation and Contributors of LVM
The main criterion of LVM is to value the dignity of employees in its entirety. For the notion of
human dignity is the basis and foundation of all human rights and the cornerstone for constitutional
acts and declarations on human rights in various contexts. We have already explored the role played
by world religions in ensuring the dignity of each human being. The secular justification of human
dignity from the Kantian ‘categorical imperative’ matches with the Catholic social tradition. The
intrinsic worth of every human being is associated both with the faith-claim of the imago Dei and
with the human capacity to reason – autonomy leading to free choice and self-determination. Both
the ‘inherent’ and ‘earned’ aspects of dignity are affirmed, therefore: the former speaks of “an
unconditional God-given dignity” or intrinsic as a “consequence of being human,” and the latter
speaks of its “conditional aspects,” gained through qualities and efforts or from instrumental
contributions in workplace contexts. The notion of the subjective dimension of work is a primary
contribution of Catholic Social Teaching (CST) to the public debates about the workplace. For CST
holds that, independent of any objective content, man as a ‘person’ is the subject of work and all
man’s actions must realize his or her humanity. LVM in the workplace argues for this experience of
being human in a situation of managerial control by appeal to the due respect and worth given to
each other. It is concerned with the role played by personal, material or economic values in the
workplace.
LVM in this regard calls for policies and regulations in the workplace to respect human dignity: both
the subjective dimension of work and the objective rights of employees to shape labour relationships
and organizational behaviours. Other concepts, such ‘corporate citizenship’ (the rights and duties of
a person as a member of a community) play a role in transactional, participatory and recognition
ethics. Notions of ‘organizational identification’ and ‘organizational justice’ call for a re-
humanization of the workplace. It is widely experienced that organizational fairness or perceived
justice in the workplace results in greater loyalty, commitment, satisfaction, and performance on the
Labourer Valued Management
Organizational Identification & Rehumanizing
Workplace
Corporate Citizenship;
Transational, Participatory &
Recognition Ethics
Dignity, Rights and Justice & Subjective Demension of Work
General Conclusion
358
part of employees. LVM’s commitment to treating every employee as a person worthy of self-esteem,
and opposing every form of unjust discrimination and subordination, can re-humanize the workplace.
The integration of personal and social normative concerns in pursuit of individual, professional and
social responsibility creates a ‘corporate conscience’ within organizations, benefiting all members
and participants. This gives birth to a sense of belongingness and treats the workplace as a
‘community of persons’ joined together for individual and organizational development.
Echoing major surveillance studies and literature, this study demonstrates that electronic surveillance
is an insolvent technique (solution) to employee management, and that a person-centered or
employee-valued management strategy is more able to transform employee behaviour. ‘Self-
monitoring’ results in better efficiency and more workplace improvements. Our empirical study also
shows that employees prefer self-monitoring to electronic (external) monitoring. Self-monitoring,
indeed, as a personality trait and an individual ability to regulate or control one’s behaviour, has been
shown to be ten times more effective in increasing efficiency and productivity. By enhancing self-
regulatory process, it transforms individual behaviours for the overall benefit of organizations and
thus moves from controlling self-presentation to a concern for social ties and status in organizations.
It is a behavioural appropriateness in the workplace through self-observation, self-control and self-
presentation. Self-monitoring is also an effective alternative to electronic monitoring and is likely to
satisfy both employers’ interests – vision or objectives – and employees’ rights and interests, such
as privacy and fair and impartial treatment. For it qualifies and empowers social interaction within
the organization through personal charisma and social sensitivity and adaptability. Employees here
show a responsible and self-regulated commitment to the improvement of the organization, driven
by a self-motivated compliance with its rational, ethical and impartial legal mandates.
Self-monitoring includes authentic self-direction and building capabilities that prioritize employees’
functioning. It regards both as valuable for the self and the organization alike. Self-direction is linked
both to individual autonomy and to a value, thus motivating human action through both freedom and
creativity. Freedom of choice is one of the denominators to expand individual capabilities and thus
wellbeing, which is achieved first internally on oneself with a distinct personal quality. This situation,
then, enables an individual to be a responsible social agent and plays a special role in moral decision
making in situations of conflict. Proper self-direction thus leads to the proper treatment of
capabilities, and vice versa. Authentic self-direction reshapes one’s individual destiny both as a
person and as a part of various communities.
This self-management mechanism alters one’s inner state and responses to a socially desirable
behaviour while maintaining symmetry of trust and transparency, combining care and justice, and
joining personal, corporate and social integrity. It acts against the invasion of privacy and social
sorting mechanisms. It provides psychological serenity and job satisfaction, and thus personal,
professional and organizational improvements. This approach is significant within the scope of this
research, as it uncompromisingly argues for the ‘human’ aspect of employees, fostering and
preserving individual freedom and the capabilities of responsible self-regulation and determination,
leading to individual, organizational and social development and flourishing. A pictorial
representation of this framework is given in Model 2.
General Conclusion
359
Model 2 - Components of Self-Monitoring [Self-Regulative] Model
We have argued in this research for a new manifesto of management, one that respects the intrinsic
value of human development and flourishing and that rethinks economics, business and management
from a humanistic or personalistic perspective. By trying to introduce a realistic personalism of both
personalist rational principles and common good principles into the ethical culture of organization,
this movement upholds its responsibility to safeguard individual rights and seek just treatment for
all. Hence, what is essential for good corporate behaviour is the individual contribution through
cooperation, mutual respect and openminded commitment, along with attitudinal and behavioural
alterations in tune with personal and organizational good. With the understanding of organization as
a community of persons, business and organizational managements are being suggested to practice
humanism by respecting the humanity of each member, treating them as an end, favouring human
potentials in creativity, rationality, and character, fostering the exercise of freedom and responsibility
and contributing to human well-being.
This understanding is in line with the Indian notion of universal family-hood (Vasudhaiva
Kutumbakam – the entire world as a single family) or the ‘cosmic’ or ‘holistic’ vision of Indian
philosophy as applied often today in the context of debates about management. One major
contribution of this research is that, over against an economy-based business ethos that gives priority
to organizational contracts, we argue for a humanistic business ethos that sees business enterprise in
its human wholeness. Thus, organizations become a community of interrelated persons with a shared
moral sense.
FINAL APPRAISAL
Such a humanistic approach can support the effective functioning and development of any
organization. As we have seen, several key ethical concepts for organizational behaviour and
management strategy, namely individual human rights, human dignity, social justice and integral
human development, can be derived from a Catholic humanistic outlook and fit very much in the
Self-
Monitoring
Authentic Self-
Direction
Trust & Transparency
Just-Care
Persoanl, Corporate &
Social Integrity
Creating Capabilities
General Conclusion
360
context of electronic surveillance studies.5 This approach entails a comprehensive view of employees
as human being. In the same way, the ontological characteristics of human beings – rationality,
relationality, sociability – have also been identified as the subjects of appropriate treatment of
employees in a given situation. John Paul II illustrates in this regard that “the person is not at all a
‘thing’ or an ‘object’ to be used, but primarily a responsible ‘subject’, one endowed with conscience
and freedom, called to live responsibly in society and history […].”6 This research urges
organizational members and all stakeholders to “rediscover and make others rediscover the inviolable
dignity of every human person”7 within the workplace. For, as Gaudium et Spes,8 the Pastoral
Constitution on the Church in the Modern World, reminds us: “man is the source, the centre and the
purpose of all economic and social life” (no. 63).
This research would desirably urge business management schools and institutions to adequately
provide a formational dimension (basic element of a working curriculum) that educates the young
managers and employees to comprehend the world of business, economics and human management
in the light of a vision of the totality of the human person and integral human development, avoiding
any kind of reductionist view of a person. Taking this research as a valid source and a strong basis,
it is desirable for Catholic Church to produce a document that provides for business people a holistic
understanding of a person over against the reductionist market view, particularly in line with the use
of electronic surveillance systems and mechanisms in the workplace and its impacts on employees
and to offer further integral, adequate and comprehensible ethical response.
This study is meant to serve as a starting point for further work in the field of workplace surveillance
and labour studies in general. Of course, many nuances remain to be explored. For example, a
detailed assessment of various trends in the field of human resource management could usefully
complement this study, as well as a review of corporate social responsibilities. Similarly, the paucity
of literature from a theological perspective on the theme of electronic workplace surveillance has
made it difficult to conduct detailed research on theological appraisals. However, this research has
been given due importance thanks to the elucidation of Catholic Humanism (CH), which has played
a major role in our accounts here of current business or economic activities, organizational
behaviours, managerial rationality and management strategies. This is thanks to the common
emphasis on human dignity, individual rights, social justice and integral human, organizational and
societal development. Another area of CH that could support further research and contribute to
human development within the workplace or organizational context is the centrality of a few specific
virtues, such as charity, humility, kindness, a willingness to forgive, etc., together with the cardinal
virtues of prudence, justice, temperance, and courage. For the human being is at the centre of every
work, and this research has been undertaken to help ensure that the life of every employee is lived in
its fullness.
5 The concept of human development is expressed here in an integrative sense as Melé would Envisage it. It
has two interrelated aspects – “personal human development embracing the whole person” and “the human
development of every human being worldwide.” Domènec Melé, “Three Key Concepts of Catholic
Humanism for Economic Activity: Human Dignity, Human Rights and Integral Human Development,” in
Humanism in Economics and Business: Perspectives of the Catholic Social Tradition, eds. Domènec Melé
and Martin Schlag, 113-136 (Dordrecht: Springer, 2015), 113-114. 6 John Paul II, “Christifideles Laici,” Post-Synodal Apostolic Exhortation on the Vocation and the Mission of
the Lay Faithful in the Church and in the World, 1988, no. 5. http://w2.vatican.va/content/john-paul-
ii/en/apost_exhortations/documents/hf_jp-ii_exh_30121988_christifideles-laici.html [accessed April 25,
2018]. 7 John Paul II, “Christifideles Laici,” no. 37. 8 Second Vatican Council, Gaudium et Spes, AAS 58 (1966), no. 63.