Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1052220.1052250acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicecConference Proceedingsconference-collections
Article

Managing email usage: a cross case analysis of experiences with electronic monitoring and control

Published: 25 March 2004 Publication History

Abstract

An email system is a critical business tool. However, as electronic business activity increases, ad-hoc email implementation, prolonged management neglect and user abuse of email systems have generated negative effects. Anticipating, managing and preventing these negative effects has become increasingly important as organisations struggle to derive benefits from these systems. Many organisations try to control the negative effects of email through a combination of policies and electronic monitoring. However, monitoring can be contentious and policies are often inadequate. This paper presents the results of a multiple case study investigation of email system monitoring and control in four organisations. The study highlights the need to formulate a coordinated and comprehensive response consisting of technical, formal and informal controls. The study reveals the effectiveness of email management committees, training, policies, and sustained awareness when combined with email monitoring. The paper concludes by identifying key factors for effectively monitoring and controlling email usage.

References

[1]
Agrwal, R. (2001) Research in Information Systems: What We Haven't Learned. MIS Quarterly, 25, 4, v-xv.
[2]
Aken, J. E. (1978) On the Control of Complex Industrial Organisations. American Bank Association (1972) Results of the National Automation Survey, Washington, DC.
[3]
American Management Association (AMA) (2000) Workplace Testing: Monitoring and Surveillance, NY, US.
[4]
Anandarajan, M., Simmers, C. and Ibgaria, M. (2000) An Exploratory Investigation of the Antecedents and Impact of Internet Usage: An Individual Perspective. Behaviour and Information Technology, 19, 1, 69--85.
[5]
Anderson, S. (1999) Managing Agency Email Systems. Rough Notes, 142, 12, Indianapolis, Dec, 16--18.
[6]
Attaran, M. (2000) Managing Legal Liability of the Net: A Ten Step Guide for IT Managers. Information Management and Computer Security, 8, 2, 98--100.
[7]
Banerjee, D., Cronan, T. P. and Jones, T. W. (1998) Modeling IT Ethics: A Study in Situational Ethics, MIS Quarterly, Mar, 31--60.
[8]
Benbasat, I., Goldstein, D. K. and Mead, M. (1987) The Case Research Strategy in Studies of Information Systems. MIS Quarterly, 368--385.
[9]
Cappel, J. J. (1995) A Study of Individuals' Ethical Beliefs and Perceptions of EMail Privacy. Journal of Business Ethics, 14, 819--827.
[10]
Culnan, M. L. and Markus, L. M. (1987) Information Technologies. In Handbook of Organisational Communication: An Interdisciplinary Perspective, Jablin, F. M., Roberts, K. H., Putnam, L. L. and Lyman W. P (Eds.), Newbury Park, CA, Sage, 420--443.
[11]
Clement, A. and McDermott, P. (1991) Electronic Monitoring: Worker Reactions and Design Alternatives. In Information Systems, Work and Organisation Design, Van Den Besselaar, P., Clement, A. and Jarvinen, P. (Eds.), Elsevier Science, B. V., Amsterdam, 187--199.
[12]
De, R. and Mathew, B. (1999) Issues in the Management of Web Technologies: Conceptual Framework, International Journal of Information Management, 19, 427--447.
[13]
Denzin, N. and Lincoln, Y. (1998) Collecting and Interpreting Qualitative Materials. Thousand Oaks, Sage.
[14]
Dhillon, G. (1999) Managing and Controlling Computer Misuse, Information Management and Computer Security, 7, 4, 171--175.
[15]
Eisenhardt, K. M. (1989) Building Theories From Case Study Research. Academy of Management, 14, 4, 532--550.
[16]
Evans, C. (2001) "An E-Strategy for Online E-Business", Information Systems and Management, Fall, 8--21.
[17]
Firestone, W. A. (1993) Alternative Arguments for Generalising from Data as Applied to Qualitative Research. Educational Researcher, 22, 4, 16--23.
[18]
Flood, L. (2003) Close Monitoring Provides Protection. The Sunday Business Post. Ireland, Feb 9.
[19]
Fulk, J. Schmitz, J. and Steinfield, C. W. (1990) A Social Influence Model of Technology Use. In Organisations and Communication Technology (Fulk, J. and Steinfield, C., Eds), Sage, London, 117--140.
[20]
Fulk, J. and Desanctis, G. (1995) Electronic Communication and Changing Organisational Forms. Organisation Science, 6, 6, Jul-Aug, 337--349.
[21]
Galliers, R. D. and Sutherland A. R. (1991) Information Systems Management and Strategy Formulation: Applying and Extending the Stages of Growth Concept. Journal of Information Systems, 1, 2, 89--114.
[22]
Guba, E. G. and Lincoln, Y. S. (1994) Competing Paradigms in Qualitative Research. In Handbook of Qualitative Research, (Denzin, and Lincoln, Eds.), C.A., Sage.
[23]
Hakim, C. (1987) Research Design: Strategies in the Design of Social Research. Allen, London.
[24]
Hancock, B. (1999) Security Views, Computers and Security, 18, 184--198.
[25]
Hodson, T. J., Englander, F. and Englander, V. (1999) Ethical, Legal and Economic Aspects of Monitoring of Employee Email, Journal of Business Ethics, 19, 99--108.
[26]
Hoffman, N. and Klepper, R. (2000) Assimilating New Technologies: The Role of Organisation Culture, Information Systems Management, Summer, 36--42.
[27]
Hoffman, M. W., Hartman, L. P. and Rowe, R. (2003) You've Got Mail and the Boss Knows: A Survey by the Center for Business Ethic, Email and Internet Monitoring. Business and Society Review, 108, 3, 285--307.
[28]
Jackson, T. W., Dawson, R. and Wilson, D. (2000) The Cost of Email Within Organisations, Proceedings of the Information Resources Management Association Conference (IRMA'00), Anchorage, Alaska, May.
[29]
Lindquist, C. (2000) You've Got Dirty Mail. ComputerWorld, 34, 11, Mar 13, Framingham, 72--73.
[30]
Mantovani, G. (1994) Is Computer-Mediated Communication Intrinsically Apt to Enhance Democracy in Organisations? Human Relations, 47, 1, 45--62.
[31]
McFarlan, F. W. and McKenney, J. L. (1982) The Information Archipelago: Gaps and Bridges. Harvard Business Review, 60, 5, Sept/Oct.
[32]
Markus, L. M. (1984) Systems in Organisations: Bugs and Features. Massachusetts, Pittman.
[33]
Markus, L. M. (1994) Finding A Happy Medium: Explaining the Negative Effects of Electronic Communication on Social Life at Work. ACM Transactions on Information Systems, 12, 2, Apr, 119--149.
[34]
Marshall, C. and Rossman, B. G. (1999) Designing Qualitative Research. 3rd Edition, Sage, C.A.
[35]
Miles, M. B. and Huberman, A. M. (1994) Qualitative Analysis: An Expanded Source Book. 2nd Ed. Sage, London.
[36]
Orlikowski, W. J. (1991) Integrated Information Environment or Matrix of Control? The Contradictory Implications of Information Technology, Accounting, Management and Information Technology, 1, 1, 9--42.
[37]
Otley, D. T. and Berry, A. J. (1980) Control, Organisation and Accounting. Accounting, Organisation and Sociology. 5, 2, 231--244.
[38]
Pennings, J. M. and Woiceshyn, J. (1987) A Typology of Organisational Control and its Metaphors, In Research in Sociology of Organisations, Greenwich, JAI Press, 73--104.
[39]
PriceWaterhouseCoopers (2002) Information Security Breaches Survey 2002. Located at http://www.Pwc.Com.
[40]
Rice, R. E. (1990) Computer-Mediated Communication System Network Data. International Journal of Man-Machine Studies, 32, 627--647.
[41]
Rogers, E. M. (1986) Communication Technology: The New Media in Society. NY, Free Press.
[42]
Romm, C. T., Pliskin, N. and Rifkin, W. D. (1996) Diffusion of Email: An Organisational Learning Perspective. Information and Management, 31, 37--46.
[43]
Rudy, I. A. (1996) A Critical Review of Research on EMail. European Journal of Information Systems, 4, 4, 198--213.
[44]
Ruggeri, G. Stevens and McElhill, J. (2000) A Qualitative Study and Model of the Use of E-Mail in Organisations, Internet Research: Electronic Networking Applications and Policy, 10, 4, 271--283.
[45]
Schulman, A. (2001) The Extent of Systematic Monitoring of Employee E-Mail and Internet Use. Located at http://www.privcyfoundation.org/workplace/technology
[46]
Sipior, J. C., Burke, T. W. and Rainone, S. M. (1996) The Ethical Dilemma of Employee Email Privacy in the United States, Proceedings of the European Conference on Information Systems (ECIS), 1996.
[47]
Sipior, J. C. and Ward, B. T. (2002) A Strategic Response to the Broad Spectrum of Internet Abuse, Information Systems Management, Fall, 71--79.
[48]
Sproull, L. and Kiesler, S. (1991) Connections: New Ways of Working in the Networked Organisation. MIT Press, Cambridge, Massachusetts.
[49]
Van Den Hooff, B. (1997) Incorporating Email: Adoption, Use and Effects of Email in Organisations. Universite IT van Amsterdam. ISBN 90-75727-72-0.
[50]
Walther, J. B. (1996) Computer Mediated Communication: Impersonal, Interpersonal, and Hyperpersonal Interaction. Communication Research, 23, 1, 3--43.
[51]
Whitman, M. E., Townsend, A. M. and Aalberts, R. J. (1999) The Communications Decency Act: An Update for IS Management. Information Systems Management, Winter, 91--94.
[52]
Wolinsky, C. and Sylvester, J. (1992) Privacy in the Telecommunications Age. Communications of the ACM, 35, 2, 23--25.
[53]
Yin, R. K. (1994) Case Study Research, Design and Methods. Sage, London.

Cited By

View all
  • (2013)E-Mail as an Official Communication Tool in BahrainInternational Journal of E-Services and Mobile Applications10.4018/jesma.20130101035:1(51-76)Online publication date: 1-Jan-2013
  • (2008)Ubiquitous Connectivity & Work-Related StressHandbook of Research on Virtual Workplaces and the New Nature of Business Practices10.4018/978-1-59904-893-2.ch013(167-182)Online publication date: 2008

Index Terms

  1. Managing email usage: a cross case analysis of experiences with electronic monitoring and control

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICEC '04: Proceedings of the 6th international conference on Electronic commerce
    March 2004
    684 pages
    ISBN:1581139306
    DOI:10.1145/1052220
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • ICEC: International Center for Electronic Commerce

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 March 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. control
    2. electronic monitoring
    3. email systems
    4. monitoring software
    5. negative effects

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate 150 of 244 submissions, 61%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2013)E-Mail as an Official Communication Tool in BahrainInternational Journal of E-Services and Mobile Applications10.4018/jesma.20130101035:1(51-76)Online publication date: 1-Jan-2013
    • (2008)Ubiquitous Connectivity & Work-Related StressHandbook of Research on Virtual Workplaces and the New Nature of Business Practices10.4018/978-1-59904-893-2.ch013(167-182)Online publication date: 2008

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media