3,735
Views
37
CrossRef citations to date
0
Altmetric
Original Articles

 An eye on your work: How empowerment affects the relationship between electronic surveillance and counterproductive work behaviours

, &

References

  • Aiello, J. R. (1993). Computer-based work monitoring: Electronic surveillance and its effects. Journal of Applied Social Psychology, 23, 499–507.10.1111/jasp.1993.23.issue-7
  • Aiello, J. R., & Kolb, K. J. (1995). Electronic performance monitoring and social context. Impact on productivity and stress. Journal of Applied Psychology, 80, 339–353.10.1037/0021-9010.80.3.339
  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.10.1016/0749-5978(91)90020-T
  • Alge, B. J. (2001). Effects of computer surveillance on perceptions of privacy and procedural justice. Journal of Applied Psychology, 86, 797–804.10.1037/0021-9010.86.4.797
  • Alge, B. J., Ballinger, G. A., Tangirala, S., & Oakley, J. L. (2006). Information privacy in organizations: Empowering creative and extra role performance. Journal of Applied Psychology, 91, 221–232.
  • Allen, M. W., Coopman, S. J., Hart, J. L., & Walker, K. L. (2007). Workplace surveillance and managing privacy boundaries. Management Communication Quarterly, 21, 172–200.10.1177/0893318907306033
  • Ambrose, M. L., & Alder, G. S. (2000). Designing, implementing, and utilizing computerized performance monitoring: Enhancing organizational justice. Research in Personnel and Human Resources Management, 18, 187–219.
  • American Management Association. (2007). Electronic monitoring and surveillance survey. Retrieved from http://www.amanet.org
  • Amundsen, S., & Martinsen, O. L. (2014). Empowering leadership: Construct clarification, conceptualization, and validation of a new scale. The Leadership Quarterly, 25, 487–511.10.1016/j.leaqua.2013.11.009
  • Amundsen, S., & Martinsen, O. L. (2015). Linking empowering leadership to job satisfaction, work effort, and creativity: The role of self-leadership and psychological empowerment. Journal of Leadership & Organizational Studies, 22, 304–323.10.1177/1548051814565819
  • Brehm, J. W. (1966). A theory of psychological reactance. San Diego, CA: Academic Press.
  • Brehm, J. W., & Brehm, S. S. (1981). Psychological reactance: A theory of freedom and control. San Diego, CA: Academic Press.
  • Brockner, J., Spreitzer, G., Mishra, A., Pepper, L., & Hochwarter, W. (2004). Perceived control as an antidote to the negative effects of layoffs on survivors’ organizational commitment and job performance. Administrative Science Quarterly, 49, 76–100.
  • Chalykoff, J., & Kochan, T. A. (1989). Computer-aided monitoring: Its influence on employee job satisfaction and turnover. Personnel Psychology, 42, 807–834.10.1111/peps.1989.42.issue-4
  • D’Urso, S. C. (2005). Electronic monitoring and surveillance in the organization. Presenting a three component model for predicting panoptic effects. Paper presented at the Annual conference of the National Communication Association, Boston, MA.
  • D’Urso, S. C. (2006). Who’s watching us at work? Toward a structural-perceptual model of electronic monitoring and surveillance in organizations. Communication Theory, 16, 281–303.10.1111/comt.2006.16.issue-3
  • Dillman, D. A. (2000). Mail and internet surveys: The tailored design method (2nd ed.). New York, NY: John Wiley.
  • Douthitt, E. A., & Aiello, J. R. (2001). The role of participation and control in the effects of computer monitoring on fairness perceptions, task satisfaction, and performance. Journal of Applied Psychology, 86, 867–874.10.1037/0021-9010.86.5.867
  • Fabrigar, L. R., Wegener, D. T., MacCallum, R. C., & Strahan, E. J. (1999). Evaluating the use of exploratory factor analysis in psychological research. Psychological Methods, 4, 272–299.10.1037/1082-989X.4.3.272
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39–50.10.2307/3151312
  • Furnham, A., & Swami, V. (2015). An investigation of attitudes toward surveillance at work and its correlates. Psychology, 6, 1668–1675.10.4236/psych.2015.613163
  • Graupmann, V., Jonas, E., Meier, E., Hawelka, S., & Aichhorn, M. (2012). Reactance, the self, and its group: When threats to freedom come from the ingroup versus the outgroup. European Journal of Social Psychology, 42, 164–173.10.1002/ejsp.v42.2
  • Greenberg, L., & Barling, J. (1999). Predicting employee aggression against coworkers, subordinates and supervisors: The roles of person behaviors and perceived workplace factors. Journal of Organizational Behavior, 20, 897–913.10.1002/(ISSN)1099-1379
  • Hayes, A. F. (2013). Mediation, moderation, and conditional process analysis: A regression-based approach. New York, NY: The Guilford Press.
  • Holland, P. J., Cooper, B., & Hecker, R. (2015). Electronic monitoring and surveillance in the workplace. Personnel Review, 44, 161–175.10.1108/PR-11-2013-0211
  • Hovorka-Mead, A. D., Ross, W. H. Jr., Whipple, T., & Renchin, M. B. (2002). Watching the detectives: Seasonal student employee reactions to electronic monitoring with and without advance notification. Personnel Psychology, 55, 329–362.10.1111/peps.2002.55.issue-2
  • Jensen, J. M., & Raver, J. L. (2012). When self-management and surveillance collide: Consequences for employees’ trust, autonomy, and discretionary behaviors. Group & Organization Management, 37, 308–346.
  • Karasek, R. A. (1979). Job demands, job decision latitude, and mental strain: Implications for job redesign. Administrative Science Quarterly, 24, 285–307.10.2307/2392498
  • Karat, J., Karat, C.-M., Brodie, C., & Feng, J. (2005). Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human-Computer Studies, 63, 153–174.10.1016/j.ijhcs.2005.04.011
  • Kidwell, R. E., & Bennett, N. (1994). Employee reactions to electronic control systems: The role of procedural fairness. Group & Organization Management, 19, 203–218.10.1177/1059601194192006
  • Larson, P. D., & Post, R. F. (2004). Improving response rates to mail surveys: A research note. Transportation Journal, 43, 67–74.
  • Lawrence, T. B., & Robinson, S. L. (2007). Ain’t misbehavin: Workplace deviance as organizational resistance. Journal of Management, 33, 378–394.10.1177/0149206307300816
  • Martin, A., Karanika-Murray, M., Biron, C., & Sanderson, K. (2016). The psychosocial work environment, employee mental health and organizational interventions: Improving research and practice by taking a multilevel approach. Stress and Health, 32, 201–215. doi:10.1002/smi.2593
  • McNall, L. A., & Stanton, J. M. (2011). Private eyes are watching you: Reactions to location sensing technologies. Journal of Business and Psychology, 26, 299–309.10.1007/s10869-010-9189-y
  • Neumann, W. L. (2004). Basics of social research: Qualitative and quantitative approaches (5th ed.). Boston, MA: Pearson Education.
  • Ngo, L. V., & O’Cass, A. (2009). Creating value offerings via operant resource-based capabilities. Industrial Marketing Management, 38, 45–59.10.1016/j.indmarman.2007.11.002
  • Nunnally, J. C. (1978). Psychometric theory. New York, NY: McGraw Hill.
  • Nussbaum, K., & duRivage, V. (1986). Computer monitoring: Mismanagement by remote control. Business and Society Review, 56, 16–29.
  • O’Connor, B. P. (2000). SPSS and SAS programs for determining the number of components using parallel analysis and Velicer’s MAP test. Behavior Research Methods, Instruments, & Computers, 32, 396–402.10.3758/BF03200807
  • O’Donnell, A. T., Jetten, J., & Ryan, M. K. (2010a). Watching over your own: How surveillance moderates the impact of shared identity on perceptions of leaders and follower behaviour. European Journal of Social Psychology, 40, 1046–1061.10.1002/ejsp.v40:6
  • O’Donnell, A. T., Jetten, J., & Ryan, M. K. (2010b). Who is watching over you? The role of shared identity in perceptions of surveillance. European Journal of Social Psychology, 40, 135–147.
  • Pace, V. L. (2010). Method variance from the perspectives of reviewers: Poorly understood problem or overemphasized complaint? Organizational Research Methods, 13, 421–434.10.1177/1094428109351751
  • Penney, L. M., & Spector, P. E. (2005). Job stress, incivility, and counterproductive work behavior (CWB): The moderating role of negative affectivity. Journal of Organizational Behavior, 26, 777–796.10.1002/(ISSN)1099-1379
  • Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 879–903.10.1037/0021-9010.88.5.879
  • Robinson, S. L., & Bennett, R. J. (1995). A typology of deviant workplace behaviors: A multidimensional scaling study. The Academy of Management Journal, 38, 555–572.
  • Robinson, S. L., & Bennett, R. J. (1997). Workplace deviance: Its definition, its manifestations, and its causes. Greenwich, CT: JAI Press.
  • Rucker, D. D., Preacher, K. J., Tormala, Z. L., & Petty, R. E. (2011). Mediation analysis in social psychology: Current practices and new recommendations. Social and Personality Psychology Compass, 5, 359–371.10.1111/j.1751-9004.2011.00355.x
  • Seibert, S. E., Silver, S. R., & Randolph, W. A. (2004). Taking empowerment to the next level: A multiple-level model of empowerment, performance, and satisfaction. Academy of Management Journal, 47, 332–349.10.2307/20159585
  • Seibert, S. E., Wang, G., & Courtright, S. H. (2011). Antecedents and consequences of psychological and team empowerment in organizations: A meta-analytic review. Journal of Applied Psychology, 96, 981–1003.10.1037/a0022676
  • Sharma, P. N., & Kirkman, B. L. (2015). Leveraging leaders: A literature review and future lines of inquiry for empowering leadership research. Group & Organization Management, 40, 193–237.10.1177/1059601115574906
  • Shih, T., & Fan, X. (2008). Comparing response rates from web and mail surveys: A meta-analysis. Field Methods, 20, 249–271.10.1177/1525822X08317085
  • Smith, M. J., Carayon, P., Sanders, K. J., Lim, S. Y., & LeGrande, D. (1992). Employee stress and health complaints in jobs with and without electronic performance monitoring. Applied Ergonomics, 23, 17–27.
  • Smith, W. P., & Tabak, F. (2009). Monitoring employee e-mails: Is there any room for privacy? Academy of Management Perspectives, 23, 33–48.10.5465/AMP.2009.45590139
  • Spector, P. E. (2006). Method variance in organizational research: Truth or urban legend? Organizational Research Methods, 9, 221–232.10.1177/1094428105284955
  • Spector, P. E., & Brannick, M. T. (2010). Common method issues: An introduction to the feature topic in organizational research methods. Organizational Research Methods, 13, 403–406.10.1177/1094428110366303
  • Spitzmüller, C., & Stanton, J. M. (2006). Examining employee compliance with organizational surveillance and monitoring. Journal of Occupational and Organizational Psychology, 79, 245–272.10.1348/096317905X52607
  • Spreitzer, G. M. (1995). Psychological, empowerment in the workplace: Dimensions, measurement and validation. Academy of Management Journal, 38, 1442–1465.10.2307/256865
  • Spreitzer, G. M. (1996). Social structural characteristics of psychological empowerment. Academy of Management Journal, 39, 483–504.10.2307/256789
  • Stanton, J. M. (2000). Traditional and electronic monitoring from an organisational justice perspective. Journal of Business and Psychology, 15, 129–147.10.1023/A:1007775020214
  • Stanton, J. M. (2002). Company profile of the frequent internet user: Web addict or happy employee? Communications of the Association for Computing Machinery, 45, 55–59.
  • Stanton, J. M., & Barnes-Farrell, J. L. (1996). Effects of electronic performance monitoring on personal control, task satisfaction, and task performance. Journal of Applied Psychology, 81, 738–745.10.1037/0021-9010.81.6.738
  • Stanton, J. M., & Weiss, E. M. (2000). Electronic monitoring in their own words: An exploratory study of employees' experiences with new types of surveillance. Computers in Human Behavior, 16, 423–440.10.1016/S0747-5632(00)00018-2
  • Subašić, E., Reynolds, K. J., Turner, J. C., Veenstra, K. E., & Haslam, S. A. (2011). Leadership, power and the use of surveillance: Implications of shared social identity for leaders’ capacity to influence. The Leadership Quarterly, 22, 170–181.10.1016/j.leaqua.2010.12.014
  • Taylor, P., & Bain, P. (1999). ‘An assembly line in the head’: Work and employee relations in the call centre. Industrial Relations Journal, 30, 101–117.10.1111/irj.1999.30.issue-2
  • Thomas, K. W., & Velthouse, B. S. (1990). Cognitive elements of empowerment: An ‘interpretative’ model of intrinsic task motivation. Academy of Management Review, 19, 312–330.
  • Tomarken, A. J., & Waller, N. G. (2003). Potential problems with ‘well fitting’ models. Journal of Abnormal Psychology, 112, 578–598.10.1037/0021-843X.112.4.578
  • Tomarken, A. J., & Waller, N. G. (2005). Structural equation modelling: Strengths, limitations, and misconceptions. Annual Reviews: Clinical Psychology, 1, 31–65.
  • Varca, P. E. (2006). Telephone surveillance in call centers: Prescriptions for reducing strain. Managing Service Quality: An International Journal, 16, 290–305.10.1108/09604520610663507
  • Welsh, B. C., & Farrington, D. P. (2003). Effects of closed-circuit television on crime. The ANNALS of the American Academy of Political and Social Science, 587, 110–135.10.1177/0002716202250802

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.