Abstract
The goal of this paper is to investigate the ethical implications of emerging forms of control that have developed along with the use of ubiquitous information technology (IT). Because it can be exerted at a distance, almost anytime and anywhere, IT-based control has become more subtle, indirect, and almost invisible, with many negative side effects. Yet the issues raised by this new form of control have rarely been interpreted, treated, and framed as ethical issues in business ethics literature. Thus, a more comprehensive inquiry rooted in ethical concerns is necessary to improve understanding of this more subtle form of control, its ethical consequences, and the way ethical considerations can be taken into consideration and acted on by management. This article addresses this goal with a qualitative, exploratory case study of a telecommunications company, in which salespeople have been equipped with ubiquitous technology. The findings specify the characteristics and consequences of ubiquitous IT-based control, thereby inviting a rethinking of the ethical issues related to the privacy, autonomy, human dignity, and health of salespeople. In particular, this article highlights four ethical issues raised by the use of ubiquitous IT at work: the ambivalence of this use of ubiquitous IT at work, the subtlety of the control exerted by ubiquitous IT, the invasiveness of ubiquitous IT, and the self-reinforcement of ubiquitous IT-based control. Such issues are not often taken into account, suggesting that ethical considerations fail to enter into managerial decision making. This study directly raises questions about the intentions, responsibilities, and divisions across different categories of organizational members who participate in such control systems. It also provides useful insights into employees’ perceptions and offers guidance to managers who want to apply a professional code of ethics to the uses of ubiquitous IT.
Similar content being viewed by others
Notes
We modified the names of the company and the respondents to ensure anonymity.
References
Alder, G. S. (1998). Ethical issues in electronic performance monitoring: A consideration of deontological and teleological perspectives. Journal of Business Ethics, 17(7), 729–743.
Alder, G. S., Schminke, M., Noel, T. W., & Kuenzi, M. (2008). Employee reactions to internet monitoring: The moderating role of ethical orientation. Journal of Business Ethics, 80(3), 481–498.
Arnold, M. (2003). On the phenomenology of technology: The Janus-faces of mobile phones. Information and Organization, 13(4), 231–256.
Ashforth, B. E., Rogers, K. M., Pratt, M. G., & Pradies, C. (2014). Ambivalence in organizations: A multilevel approach. Organization Science, 25(5), 1453–1478.
Baskerville, R. (1999). Investigating information systems with action research. Communications of the AIS, 2(1), 1–32.
Beauchamp, T. L., & Bowie, N. E. (1993). Ethical theory and business. Englewood Cliffs, NJ: Prentice Hall.
Chen, T. Y. (2001). Ethics control mechanisms: A comparative observation of Hong Kong companies. Journal of Business Ethics, 30(4), 391–400.
Clegg, S. R. (1990). Modern organizations: Organization studies in the postmodern world. London: Sage.
Cousins, C. K., & Robey, D. (2005). Human agency in a wireless world: Patterns of technology use in nomadic computing environments. Information and Organization, 15(2), 151–180.
Davis, G. B. (2002). Considering the implications and consequences of the always-connected lifestyle. Communications of the ACM, 45(12), 67–73.
DeGeorge, R. T. (1986). Business ethics. New York: Macmillan.
Deleuze, G. (1992). Postscript on the societies of control (pp. 3–7). Cambridge, MA: MIT Press.
Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review, 14(4), 532–550.
Forester, T., & Morrison, Perry. (1991). Computer ethics: Cautionary tales and ethical dilemmas in computing. Cambridge, MA: MIT Press.
Garson, B. (1988). The electronic sweatshop. New York: Simon & Schuster.
Goffman, E. (1959). The presentation of self in everyday life. New York: Doubleday Anchor Books.
Grant, R., & Higgins, C. (1989). Monitoring service workers via computer: The effect on employees, productivity and service. Natural Productivity Review, 8, 101–112.
Gratz, J. E. (1984). The ethics of subliminal communication. Journal of Business Ethics, 3(3), 181–184.
Hawk, S. R. (1994). The effects of computerized performance monitoring: An ethical perspective. Journal of Business Ethics, 13(12), 949–957.
Hislop, D., & Axtell, C. (2011). Mobile phones during work and non-work time: A case study of mobile, non-managerial workers. Information and Organization, 21(1), 41–56.
Hodson, T. J., Englander, F., & Englander, V. (1999). Ethical, legal and economic aspects of employer monitoring of employee electronic mail. Journal of Business Ethics, 19(1), 99–108.
Jarveenpa, S. L., & Lang, K. R. (2005). Managing the paradoxes of mobile technology. IS Management, 22(4), 7–23.
Jouët, J. (1993). Pratiques de communication et figures de la médiation. Réseaux, 60, 99–120.
Langford, D. (1995). Practical computer ethics. Upper Saddle River, NJ: Prentice Hall.
Lyon, D. (1993). An electronic panopticon? A sociological critique of surveillance society. Sociological Review, 41, 653–678.
Lyon, D. (1994). The rise of surveillance society. Cambridge, UK: Polity.
Lyon, D., & Bauman, Z. (2012). Liquid surveillance: A conversation. Polity, UK: PCVS-Polity Conversations Series.
Maguire, S. (1999). The discourse of control. Journal of Business Ethics, 19(1), 109–114.
Martin, K., & Freeman, R. E. (2003). Some problems with employee monitoring. Journal of Business Ethics, 43(4), 353–361.
Marx, G., & Sherinzen, S. (1986). Monitoring on the job. Technology Review, 89, 63–72.
Mazmanian, M. A., Orlikowski, W. J., & Yates, J. (2005). Crackberries: The social implications of ubiquitous wireless e-mail devices. In C. Sorensen, Y. Yoo, K. Lyytinen, & J. J. Degross (Eds.), Designing ubiquitous information environments: Socio-technical issues and challenges (pp. 337–344). New York: Springer.
Middleton, C. A., & Cukier, W. (2006). Is mobile email functional or dysfunctional? Two perspectives on mobile email usage. European Journal of Information Systems, 15(3), 252–260.
Miles, M., & Huberman, M. (1994). Qualitative data analysis. Beverly Hills: Sage.
Miller, S., & Weckert, J. (2000). Privacy, the workplace and the Internet. Journal of Business Ethics, 28(3), 255–265.
Mintzberg, H. (1994). Rounding out the manager’s job. Sloan Management Review, 36(1), 11–26.
Ottensmeyer, E. J., & Heroux, M. A. (1991). Ethics, public policy, and managing advanced technologies: The case of electronic surveillance. Journal of Business Ethics, 10(7), 519–526.
Poster, M. (1990). The mode of information: Poststructuralism and social context. Cambridge, UK: Polity.
Prasopoulou, E., Pouloudi, A., & Panteli, N. (2006). Enacting new temporal boundaries: The role of mobile phones. European Journal of Information Systems, 15(3), 277–284.
Robey, D., Lyytinen, K., Varshney, U., Davis, G., Ackerman, M. S., Avital, M., et al. (2004). Surfing the next wave: Design and implementation challenges of ubiquitous computing environments. Communications of the AIS, 13(1), 697–716.
Severson, R. (1997). The principles of information ethics. Armonk, NY: ME Sharp.
Sewell, G., & Barker, J. R. (2001). Neither good, nor bad, but dangerous: Surveillance as an ethical paradox. Ethics and Information Technology, 3(3), 181–194.
Sewell, G., & Wilkinson, B. (1992). Someone to watch over me: Surveillance, discipline and the just-in-time labour process. Sociology, 26(2), 271–289.
Sorensen, C., & Gibson, D. (2004). Ubiquitous visions and opaque realities: Professionals talking about mobile technologies. Journal of Policy, Regulation and Strategy for Telecommunications, 63, 188–196.
Strategy Analytics (2013). Has BYOD been found out? Sales of corporate-owned smartphones surge in Q3 2013 December 10, Retrieved October 05, 2014, from http://www.strategyanalytics.com/default.aspx?mod=pressreleaseviewer&a0=5450.
Urry, J. (2005). Sociologie des mobilites, une nouvelle frontière pour la sociologie?. Paris: Armand Collin, Collection U.
Varshney, U. (2003). Mobile and wireless information systems: Applications: Networks, and research problems. Communications of the AIS, 12(11), 155–166.
Webster, J. (1995). Networks of collaboration or conflict? Electronic data interchange and power in the supply chain. Journal of Strategic Information Systems, 4(1), 31–42.
Wiredu, G. O., & Sorensen, C. (2006). The dynamics of control and mobile computing in distributed activities. European Journal of Information Systems, 15(3), 307–319.
Yin, R. (2003). Case study research (3rd ed.). Thousand Oaks, CA: Sage.
Zuboff, S. (1988). In the age of the smart machine. New York: Basic Books.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Leclercq-Vandelannoitte, A. An Ethical Perspective on Emerging Forms of Ubiquitous IT-Based Control. J Bus Ethics 142, 139–154 (2017). https://doi.org/10.1007/s10551-015-2708-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-015-2708-z