Ethics And Theory

Read Complete Research Material



Ethics and Theory

Ethics and Theory

Introduction

In this paper, we discuss an issue related to computer use and ethics in the context of a selected theory. In a broad sense, this paper analyses the issue of electronic monitoring of employees' Personal Web Use (PWU) at work in relation to social contract theory. Contracts are excellent models for this undertaking.

Discussion

Contemporary adaptations of a contract idea stem largely from the example and influence of John Rawls (1921-2002). Rawls proposes a device, the “veil of ignorance,” which we are to pull over ourselves, to ensure that the “contract” will be fair. No one is to know what his or her own situation is in the society that is to be regulated by the principles we propose to formulate by unanimous decision (Spitzmüller, 2006). Thus, no one will be able to rig the principles so as to favor himself or herself at the expense of others. Why Rawls should have thought that a contract that had to be unanimous among all people would somehow be able to favor any particular person despite that is unclear. Nevertheless, it is a striking and possibly fruitful image (Robinson, 2008).

Complicating matters, however, is what amounts to a measure of mistrust for his device. Not only does Rawls impose the veil of ignorance but he also deviates, to an uncertain extent, from the original idea in positing that we are to allow some influence from pretheoretic moral beliefs in our construction of the theory (the method of “reflective equilibrium”). We also posit that the parties to the deliberation are “equal.” (Skyrms, 2006) From stealing and corruption to bullying and sabotage, the types of deviance happening inside organizations today are vast and costly (Jasay, 2006).

External pressures, such as industry standards and legal mandates, along with those from the inside, such as declining profits and inefficiencies, often pressure managers to curtail mis-behavior within the confines of the organization. Whether it is shirking or other types of withholding effort, controlling employee behavior has long been a theme guiding the study and practice of management. In an effort to identify and decrease employee misbehavior, organizations use a variety of oversight tools, including surveillance technologies (McNall, 2007).

The electronic monitoring is used to collect information on a wide range of employee behavior related to task performance that may otherwise be unobservable to direct supervision.

When users' PWU activity is monitored, the degree to which they perceive that the monitoring is justly designed and implemented may influence their attitudes and corresponding behavioral response (Alge, 2008). In an experimental study on computer surveillance, including PWU, Alge (2001) found that the relevance of the collected data had a negative effect on privacy perceptions.

If the monitoring collects data that are deemed private by the user, such as content from personal e-mails or the types of Web sites visited, this study suggests that the monitoring will be perceived as being procedurally unjust (Alder, 2007). In addition, this study points to the influential role of user participation in the monitoring design ...
Related Ads