TY - JOUR
T1 - Information technology, privacy, and power within organizations
T2 - A view from boundary theory and social exchange perspectives
AU - Stanton, Jeffrey M.
AU - Stam, Kathryn R.
N1 - Funding Information:
1 Authors’ note: Jeffrey M. Stanton and Kathryn R. Stam, School of Information Studies, Syracuse University. This work was supported in part by award SES9984111 from the National Science Foundation. The National Science Foundation does not necessarily endorse the positions or conclusions expressed in this work. Address all correspondence to the first author at 4-125 Center for Science and Technology, Syracuse University, 13244-4100, mailto:jmstanto@syr.edu
Funding Information:
Before we begin, I need to mention a couple of formalities about this interview. I am working with Dr. Jeffrey Stanton at Syracuse University on a project that has been funded by the National Science Foundation. This research has been approved Syracuse University’s institutional review board and given project number 01123. In this research we are looking at some effects of technology on the workplace and the changes that occur with the introduction of new informa tion systems and practices. We would like to get your perspectives on these issues during this 50-minute interview.
Publisher Copyright:
© 2003 Surveillance & Society and the author(s). All rights reserved.
Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2003
Y1 - 2003
N2 - Over recent years, information technology has played an increasingly important role in the monitoring and surveillance of worker behavior in organizations. In this article, we take the position that managers, workers, and information technology professionals alike see worker-related information as a valuable organizational resource and that processes of social exchange influence how this information resource is controlled. These suppositions are woven together by joining two theories, information boundary theory, a motivational framework for examining privacy at work, and social exchange theory, which provides a perspective on social networks and social power. After discussing these two frameworks and how they might be interlaced, we analyze a corpus of semi -structured interviews with 119 managers, employees, and IT professionals that explored questions of privacy, motivation, and power in six not-for-profit organizations that were undergoing technology-driven change with potential for increased monitoring and surveillance.
AB - Over recent years, information technology has played an increasingly important role in the monitoring and surveillance of worker behavior in organizations. In this article, we take the position that managers, workers, and information technology professionals alike see worker-related information as a valuable organizational resource and that processes of social exchange influence how this information resource is controlled. These suppositions are woven together by joining two theories, information boundary theory, a motivational framework for examining privacy at work, and social exchange theory, which provides a perspective on social networks and social power. After discussing these two frameworks and how they might be interlaced, we analyze a corpus of semi -structured interviews with 119 managers, employees, and IT professionals that explored questions of privacy, motivation, and power in six not-for-profit organizations that were undergoing technology-driven change with potential for increased monitoring and surveillance.
UR - http://www.scopus.com/inward/record.url?scp=2942642938&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=2942642938&partnerID=8YFLogxK
U2 - 10.24908/ss.v1i2.3351
DO - 10.24908/ss.v1i2.3351
M3 - Article
AN - SCOPUS:2942642938
VL - 1
SP - 152
EP - 190
JO - Surveillance & Society
JF - Surveillance & Society
SN - 1477-7487
IS - 2
ER -