36 research outputs found

    The right expert at the right time and place: From expertise identification to expertise selection

    Get PDF
    We propose a unified and complete solution for expert finding in organizations, including not only expertise identification, but also expertise selection functionality. The latter two include the use of implicit and explicit preferences of users on meeting each other, as well as localization and planning as important auxiliary processes. We also propose a solution for privacy protection, which is urgently required in view of the huge amount of privacy sensitive data involved. Various parts are elaborated elsewhere, and we look forward to a realization and usage of the proposed system as a whole

    Ethical Considerations in Workplace Violence Prevention Monitoring

    Get PDF
    Workplace violence prevention monitoring is defined as any method companies use to investigate, estimate, and record potential violence risks and actual violence in the workplace. Such efforts include providing background investigations of employees, monitoring and recording employees\u27 work behaviors, performing risk assessments, training employees to monitor violent or threatening acts, and developing workplace violence monitoring policies. Each effort contains potential ethical problems. This paper outlines the various ethical considerations of violence prevention monitoring and makes recommendations based on them. The need for safety, security, productivity, employee relations, reputation, and discrimination has to be balanced with privacy, accuracy, consistency, immediacy, impartiality, informed consent, and and [sic] civil rights issues

    Email correspondence : a qualitative data collection tool for organisational researchers

    Full text link
    This paper proposes a novel method for qualitative data collection in organisational research, that of email correspondence. This approach involves written communication between the researcher and each respondent, as a conversational dialogue is constructed. An overview of this method of engaging vvith respondents is provided. The author then discusses how email correspondence was used in two studies of middle managers, outlining both the benefits and challenges experienced. Lessons learned for future use of the method are also considered. Email correspondence proved a valuable tool in revealing respondents\u27 workplace experiences, and this method provides opportunity for organisational researchers seeking to explore employees\u27 personal reflections.<br /

    Online support for shop-floor operators using body movements tracking

    Get PDF
    This paper presents results of experiments on the integration of human operators and automation in the context of assembly systems. Several experiments have been conducted to evaluate the use of augmented reality applications in order to provide dynamic work instructions and online feedback information to a shop-floor operator. Based on these results, an experimental platform has been developed so that the shop-floor operator and the automated system behave as a closed-loop system

    Questioning the future of paper and online survey questionnaires for management research

    Full text link
    The way that we build the foundations of our intellectual capital in management has changed. One example is the steady move in management research from the use of traditional paper-based survey questionnaires to online technology-based formats. This paper considers this shift, particularly focusing on the question of whether the advantages of online survey questionnaires outweigh their potential problems. The historical use of paper-based survey questionnaires has produced a large body of literature on both the advantages and disadvantages in their use, which are reviewed here alongside those of online survey questionnaires. In addition, welI-tested methods are available for increasing survey response rates in paper format, and these should not be thrown out in the quest to utilise online survey methodology. Rather, researchers should aim to exploit the potential benefits of online technologies and increase response rate by thoughtfully combining traditional and new methods. This paper argues for further discussion and research attention on electronic methods of data collection to ensure potential cost savings are not outweighed by either financial or participation costs involved in online survey questionnaire design.<br /

    Legal and Ethical Implications of Employee Location Monitoring

    Get PDF
    Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to sensor networks able to determine locations within buildings. Few international laws and no American laws directly address location monitoring. International privacy laws, the Electronic Communications Privacy Act, the USA Patriot Act and other laws involving Internet and e-mail monitoring might provide the pattern for future location monitoring legislation. Ethical considerations such as privacy, accuracy, inconsistency, security, and reputation also may affect future legislation. In writing corporate policies governing location monitoring, the employer’s business interests may outweigh an employee’s privacy interest. However, privacy invasion may be considered when the employer’s monitoring has been physically invasive and has no legitimate business purpose. Future research should investigate management and employee attitudes toward location monitoring and the pattern of location monitoring policies

    Ethical issues for internet use policy : balancing employer and employee perspectives

    Full text link
    An organisational internet use policy (IUP) is a recognised deterrent to manage insider internet misuse. However, IUPs have proven ineffective against this threat, perhaps because of their neglect of the ethical issues involved. An important part of setting an IUP involves the resolution of key ethical dilemmas when employer and employee perspectives conflict. This paper explores the ethical issues that must be addressed when developing an organisational IUP. It draws on a conceptual analysis and an interpretive study of five medium-size and large organisations in Australia and North America. The paper provides a set of key ethical issues for an IUP and compares and contrasts the employer and employee perspectives. It highlights the need to balance the employer and employee perspectives when setting an IUP. Other implications for theory and practice are discussed.<br /

    Recorded Work Meetings and Algorithmic Tools: Anticipated Boundary Turbulence

    Get PDF
    Meeting recordings and algorithmic tools that process and evaluate recorded meeting data may provide many new opportunities for employees, teams, and organizations. Yet, the use of this data raises important consent, data use, and privacy issues. The purpose of this research is to identify key tensions that should be addressed in organizational policymaking about data use from recorded work meetings. Based on interviews with 50 professionals in the United States, China, and Germany, we identify the following five key tensions (anticipated boundary turbulence) that should be addressed in a social contract approach to organizational policymaking for data use of recorded work meetings: disruption versus help in relationships, privacy versus transparency, employee control versus management control, learning versus evaluation, and trust in AI versus trust in people

    Facial Recognition and Privacy Rights

    Get PDF
    Biometric facial recognition is one of the most rapidly developing methods of biometric identification, with expanding applications across law enforcement, government and the private sector. Its capacity for integration with other technologies, such as closed circuit television (CCTV) and social media, differentiate it from DNA and fingerprint biometric identification. This chapter commences with a discussion of the technique of facial recognition and applications in identity verification, public surveillance, and the identification of unknown suspects. Its relative advantages and disadvantages, and the development of facial recognition around the world is explored. The discussion then examines how facial recognition databases developed from existing databases, such as driver’s licence photographs, can be integrated with CCTV systems, and most recently, with photographs from social media and the internet. The chapter then considers relevant ethical principles, including privacy, autonomy, security and public safety, and the implications for law and regulation in relation to facial recognition.</p
    corecore