Intersectional Im/Mobilities: gender, family and information technology professionals in digital India

2021 ◽  
pp. 1-18
Author(s):  
Sakshi Shukla ◽  
Mayurakshi Chaudhuri
2002 ◽  
Vol 1 (2) ◽  
pp. 152-190 ◽  
Author(s):  
Jeffrey M. Stanton ◽  
Kathryn R. Stam

Over recent years, information technology has played an increasingly important role in the monitoring and surveillance of worker behavior in organizations. In this article, we take the position that managers, workers, and information technology professionals alike see worker-related information as a valuable organizational resource and that processes of social exchange influence how this information resource is controlled. These suppositions are woven together by joining two theories, information boundary theory, a motivational framework for examining privacy at work, and social exchange theory, which provides a perspective on social networks and social power. After discussing these two frameworks and how they might be interlaced, we analyze a corpus of semi-structured interviews with 119 managers, employees, and IT professionals that explored questions of privacy, motivation, and power in six not-for-profit organizations that were undergoing technology-driven change with potential for increased monitoring and surveillance.


2007 ◽  
Vol 5 (2) ◽  
pp. 62 ◽  
Author(s):  
Riëtte Sutherland ◽  
Gideon P. De Bruin ◽  
Freddie Crous

This study examined the relationship between conscientiousness, empowerment and job performance among information technology professionals. An Employee Empowerment Questionnaire (EEQ), a Conscientiousness Scale and a Social Desirability Scale were administered to 101 information technology customer service engineers. Managers completed a Performance Evaluation Questionnaire (PEQ) for each customer service engineer. The results indicated a significant relationship between conscientiousness and empowerment. A curvilinear relationship was found between empowerment and performance. The practical and theoretical implications of the findings are discussed.


Author(s):  
Suchinthi Fernando

This chapter discusses the importance of information security education for everyone, ranging from organizations to professionals and students, all the way through to individual users of information and communication systems. It discusses the different subject areas in information security and shows how instead of being intimidated by it, different categories of users can obtain varying depths of information security education based on their cyber-activities and need for knowledge. Information security professionals would require an in-depth knowledge in all aspects of information security, and information technology professionals and students would require an overall education in these areas, while most users of information and communication systems would only require a basic education to help protect their information assets in cyberspace.


Author(s):  
Bernd Carsten Stahl ◽  
Mary Prior ◽  
Sara Wilford ◽  
Dervla Collins

This chapter will start with a discussion of three different pieces of research concerning surveillance. The first study looks at the perception of surveillance by some of those people who supervise and implement it; namely, information systems or information technology professionals. The next study investigates students’ perception of surveillance in their university, while the last one is an in-depth study of two organisations with regard to surveillance. The combining factor of these three studies is that the subjects do not necessarily see surveillance as problematic. Given this surprising finding, this chapter will recount the arguments for and against surveillance as found in the literature. This will lead to a discussion of the reasons why individuals often do not seem to mind surveillance, despite good evidence that it may be psychologically, morally, socially, and even economically harmful. The chapter will end with a discussion of what these findings can mean for people interested in surveillance.


Sign in / Sign up

Export Citation Format

Share Document