SlideShare a Scribd company logo
1 of 19
Download to read offline
Ethical and Social
Issues
Ethical Issues
● Privacy
● Workplace Monitoring
● Power over Users
PRIVACY
PRIVACY:
● Secluding information which is considered
private.
● To keep boundaries between personal and
workplace.
SECURITY:
● Have all information to prevent any
wrongdoing.
● Keeping an eye on employees and their data
to protect the organization from their
wrongdoing.
Workplace Monitoring
INFORMATION PANOPTICON
Role of Monitoring
➔ Workplace monitoring refers to observing and recording the behaviour of
employees in their place of work through electronic devices
➔ Organisations adopt monitoring to check both, information entering the
organisation from the outside as well as that leaving the organisation
➔ All kinds of organisations use monitoring
➔ For some firms it could be a competitive necessity
Types of Workplace Monitoring
• Video surveillance
• Network logs
• Emails – incoming and outgoi ng
• Employee Identity – cards and biometric
data
• Access given to outside agencies to obtain
employee personal data
Power Over Users
● Power of IT Professionals has increased in the organizations
● Power comes with hierarchy or assumption of superior knowledge
● An individual with power can influence the behaviour of a person
Exercise Of Power
● Technical exercise of power
● Structural exercise of power
● Conceptual exercise of power
● Symbolic exercise of power
Awareness Of Exercise Of Power
Social Issues
1. Workplace Behaviour and Health
a. Resistance and Conformity
b. Changing Work Practices
2. De-Skilling
Workplace Behaviour and Health
Workplace behavior is the behavior one uses in employment and is normally more formal than other types of
human behavior. This varies from profession to profession, as some are far more casual than others.
1. Resistance and Conformity
a. Loss of Job.
b. Loss of Control
c. Lack of Competence
2. Changing Work Practices
1. More Information to Deal with.
2. Increased Monitoring.
3. Increased Workloads.
4. Increased Paperworks.
5. Rearranged Workspaces.
De- Skilling
Deskilling is the process by which skilled labor within an industry or economy is eliminated by the
introduction of technologies operated by semiskilled or unskilled workers.
This results in cost savings due to lower investment in human capital, and reduces barriers to entry,
weakening the bargaining power of the human capital.
E-Waste
Electronic waste or e-waste describes discarded electrical or electronic devices. Used
electronics which are destined for reuse, resale, salvage, recycling, or disposal are also
considered e-waste
E-waste is a serious environmental problem, from toxic chemicals and heavy metals leaching
into soils in landfills, to the pollution in air and water supplies caused through improper
recycling techniques in developing countries.
Developed nations mostly bury their e-waste in landfills or export e-waste to less developed
nations where this problem is heightened due to unscientific disposal methods.
Managing E-Waste
1. Reduce
2. Reuse
3. Recycle
4. Take them back to the store
5. Live in the cloud

More Related Content

What's hot

Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureThe Pathway Group
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption PreventionKendal Peterson
 

What's hot (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention
 

Similar to Workplace Monitoring

20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
Work Skills Occupations and Innovation 2010 Ser Inn Bman62052 4
Work Skills Occupations and Innovation 2010 Ser Inn Bman62052 4 Work Skills Occupations and Innovation 2010 Ser Inn Bman62052 4
Work Skills Occupations and Innovation 2010 Ser Inn Bman62052 4 Ian Miles
 
Sustainable IT: The Importance of Equipment Disposal and Recycling.doc
Sustainable IT: The Importance of Equipment Disposal and Recycling.docSustainable IT: The Importance of Equipment Disposal and Recycling.doc
Sustainable IT: The Importance of Equipment Disposal and Recycling.docChicago Shredder
 
Part 2 digitization in operational and supply chain risk management
Part 2 digitization in operational and supply chain risk managementPart 2 digitization in operational and supply chain risk management
Part 2 digitization in operational and supply chain risk managementJohnny Browaeys - 庄博闻
 
TrustArc Webinar: COVID-19, Two Years Later – Still A Data Privacy Challenge
TrustArc Webinar: COVID-19, Two Years Later – Still A Data Privacy ChallengeTrustArc Webinar: COVID-19, Two Years Later – Still A Data Privacy Challenge
TrustArc Webinar: COVID-19, Two Years Later – Still A Data Privacy ChallengeTrustArc
 
Recruitment & selection ppt
Recruitment & selection pptRecruitment & selection ppt
Recruitment & selection pptkushal0089
 
Recruitment & selection ppt
Recruitment & selection pptRecruitment & selection ppt
Recruitment & selection pptkushal0089
 
Gain instant access to building information with ARC Facilities
Gain instant access to building information with ARC FacilitiesGain instant access to building information with ARC Facilities
Gain instant access to building information with ARC Facilitiesfarandi
 
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5umphreym
 
Employment
EmploymentEmployment
EmploymentZenaTaha
 
Lesson 1 - Overview of Information and Communication Technology (ICT).pdf
Lesson 1 - Overview of Information and Communication Technology (ICT).pdfLesson 1 - Overview of Information and Communication Technology (ICT).pdf
Lesson 1 - Overview of Information and Communication Technology (ICT).pdfrh8g7p44p7
 
Safeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset DispositionSafeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset DispositionIron Mountain
 

Similar to Workplace Monitoring (20)

20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Work Skills Occupations and Innovation 2010 Ser Inn Bman62052 4
Work Skills Occupations and Innovation 2010 Ser Inn Bman62052 4 Work Skills Occupations and Innovation 2010 Ser Inn Bman62052 4
Work Skills Occupations and Innovation 2010 Ser Inn Bman62052 4
 
Sustainable IT: The Importance of Equipment Disposal and Recycling.doc
Sustainable IT: The Importance of Equipment Disposal and Recycling.docSustainable IT: The Importance of Equipment Disposal and Recycling.doc
Sustainable IT: The Importance of Equipment Disposal and Recycling.doc
 
Part 2 digitization in operational and supply chain risk management
Part 2 digitization in operational and supply chain risk managementPart 2 digitization in operational and supply chain risk management
Part 2 digitization in operational and supply chain risk management
 
TrustArc Webinar: COVID-19, Two Years Later – Still A Data Privacy Challenge
TrustArc Webinar: COVID-19, Two Years Later – Still A Data Privacy ChallengeTrustArc Webinar: COVID-19, Two Years Later – Still A Data Privacy Challenge
TrustArc Webinar: COVID-19, Two Years Later – Still A Data Privacy Challenge
 
Recruitment & selection ppt
Recruitment & selection pptRecruitment & selection ppt
Recruitment & selection ppt
 
Recruitment & selection ppt
Recruitment & selection pptRecruitment & selection ppt
Recruitment & selection ppt
 
Presentation
PresentationPresentation
Presentation
 
Q-Pulse & Data Integrity
Q-Pulse & Data IntegrityQ-Pulse & Data Integrity
Q-Pulse & Data Integrity
 
Gain instant access to building information with ARC Facilities
Gain instant access to building information with ARC FacilitiesGain instant access to building information with ARC Facilities
Gain instant access to building information with ARC Facilities
 
Bridge the Gap Between IT and Staff
Bridge the Gap Between IT and StaffBridge the Gap Between IT and Staff
Bridge the Gap Between IT and Staff
 
13824518.ppt
13824518.ppt13824518.ppt
13824518.ppt
 
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5
 
Presentation on the Proposed Technology-related Revisions to the Code
Presentation on the Proposed Technology-related Revisions to the CodePresentation on the Proposed Technology-related Revisions to the Code
Presentation on the Proposed Technology-related Revisions to the Code
 
Managing Cyber and Five Other Technology Risks
Managing Cyber and Five Other Technology RisksManaging Cyber and Five Other Technology Risks
Managing Cyber and Five Other Technology Risks
 
Employment
EmploymentEmployment
Employment
 
impact.pptx
impact.pptximpact.pptx
impact.pptx
 
Lesson 1 - Overview of Information and Communication Technology (ICT).pdf
Lesson 1 - Overview of Information and Communication Technology (ICT).pdfLesson 1 - Overview of Information and Communication Technology (ICT).pdf
Lesson 1 - Overview of Information and Communication Technology (ICT).pdf
 
Safeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset DispositionSafeguarding Your Brand With Secure IT Asset Disposition
Safeguarding Your Brand With Secure IT Asset Disposition
 
E-waste
E-waste E-waste
E-waste
 

Recently uploaded

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Recently uploaded (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Workplace Monitoring

  • 2. Ethical Issues ● Privacy ● Workplace Monitoring ● Power over Users
  • 4. PRIVACY: ● Secluding information which is considered private. ● To keep boundaries between personal and workplace. SECURITY: ● Have all information to prevent any wrongdoing. ● Keeping an eye on employees and their data to protect the organization from their wrongdoing.
  • 5.
  • 8. Role of Monitoring ➔ Workplace monitoring refers to observing and recording the behaviour of employees in their place of work through electronic devices ➔ Organisations adopt monitoring to check both, information entering the organisation from the outside as well as that leaving the organisation ➔ All kinds of organisations use monitoring ➔ For some firms it could be a competitive necessity
  • 9. Types of Workplace Monitoring • Video surveillance • Network logs • Emails – incoming and outgoi ng • Employee Identity – cards and biometric data • Access given to outside agencies to obtain employee personal data
  • 10. Power Over Users ● Power of IT Professionals has increased in the organizations ● Power comes with hierarchy or assumption of superior knowledge ● An individual with power can influence the behaviour of a person
  • 11. Exercise Of Power ● Technical exercise of power ● Structural exercise of power ● Conceptual exercise of power ● Symbolic exercise of power
  • 13. Social Issues 1. Workplace Behaviour and Health a. Resistance and Conformity b. Changing Work Practices 2. De-Skilling
  • 14. Workplace Behaviour and Health Workplace behavior is the behavior one uses in employment and is normally more formal than other types of human behavior. This varies from profession to profession, as some are far more casual than others. 1. Resistance and Conformity a. Loss of Job. b. Loss of Control c. Lack of Competence
  • 15. 2. Changing Work Practices 1. More Information to Deal with. 2. Increased Monitoring. 3. Increased Workloads. 4. Increased Paperworks. 5. Rearranged Workspaces.
  • 16. De- Skilling Deskilling is the process by which skilled labor within an industry or economy is eliminated by the introduction of technologies operated by semiskilled or unskilled workers. This results in cost savings due to lower investment in human capital, and reduces barriers to entry, weakening the bargaining power of the human capital.
  • 17. E-Waste Electronic waste or e-waste describes discarded electrical or electronic devices. Used electronics which are destined for reuse, resale, salvage, recycling, or disposal are also considered e-waste E-waste is a serious environmental problem, from toxic chemicals and heavy metals leaching into soils in landfills, to the pollution in air and water supplies caused through improper recycling techniques in developing countries. Developed nations mostly bury their e-waste in landfills or export e-waste to less developed nations where this problem is heightened due to unscientific disposal methods.
  • 18.
  • 19. Managing E-Waste 1. Reduce 2. Reuse 3. Recycle 4. Take them back to the store 5. Live in the cloud