{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:22:56Z","timestamp":1775254976795,"version":"3.50.1"},"reference-count":67,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"vor","delay-in-days":17,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100001345","name":"Social Science Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100001345","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The future of work increasingly focuses on the collection and analysis of worker data to monitor communication, ensure productivity, reduce security threats, and assist in decision-making. The COVID-19 pandemic increased employer reliance on these technologies; however, the blurring of home and work boundaries meant these monitoring tools might also surveil private spaces. To explore workers\u2019 attitudes toward increased monitoring practices, we present findings from a factorial vignette survey of 645 U.S. adults who worked from home during the early months of the pandemic. Using the theory of privacy as contextual integrity to guide the survey design and analysis, we unpack the types of workplace surveillance practices that violate privacy norms and consider attitudinal differences between male and female workers. Our findings highlight that the acceptability of workplace surveillance practices is highly contextual, and that reductions in privacy and autonomy at work may further exacerbate power imbalances, especially for vulnerable employees.<\/jats:p>","DOI":"10.1093\/jcmc\/zmad007","type":"journal-article","created":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T14:08:23Z","timestamp":1688047703000},"source":"Crossref","is-referenced-by-count":25,"title":["Surveillance and the future of work: exploring employees\u2019 attitudes toward monitoring in a post-COVID workplace"],"prefix":"10.1093","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9362-9032","authenticated-orcid":false,"given":"Jessica","family":"Vitak","sequence":"first","affiliation":[{"name":"College of Information Studies, University of Maryland , College Park, Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4229-4847","authenticated-orcid":false,"given":"Michael","family":"Zimmer","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Marquette University , Milwaukee, Wisconsin, USA"}]}],"member":"286","published-online":{"date-parts":[[2023,6,29]]},"reference":[{"key":"2023062914013337400_zmad007-B1","volume-title":"The datafication of employment: How surveillance and capitalism are shaping workers\u2019 futures without their knowledge","author":"Adler-Bell","year":"2018"},{"key":"2023062914013337400_zmad007-B2","author":"Aksoy","year":"2022"},{"key":"2023062914013337400_zmad007-B3","author":"Alsan","year":"2020"},{"issue":"1","key":"2023062914013337400_zmad007-B4","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1080\/00236561003654776","article-title":"Workplace surveillance: An overview","volume":"51","author":"Ball","year":"2010","journal-title":"Labor History"},{"key":"2023062914013337400_zmad007-B5","author":"Ball","year":"2021"},{"issue":"4","key":"2023062914013337400_zmad007-B6","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1108\/09593841211278785","article-title":"Dimensions of employee privacy: An empirical study","volume":"25","author":"Ball","year":"2012","journal-title":"Information Technology & People"},{"issue":"1","key":"2023062914013337400_zmad007-B7","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1111\/jcom.12276","article-title":"Online privacy concerns and privacy management: A meta-analytical review","volume":"67","author":"Baruh","year":"2017","journal-title":"Journal of Communication"},{"key":"2023062914013337400_zmad007-B8","volume-title":"The new future of work: Research from microsoft on the impact of the pandemic on work practices","author":"Baym","year":"2021"},{"key":"2023062914013337400_zmad007-B9","volume-title":"The control revolution: Technological and economic origins of the information society","author":"Beniger","year":"1986"},{"key":"2023062914013337400_zmad007-B10","author":"Berry","year":"2010"},{"issue":"3","key":"2023062914013337400_zmad007-B11","first-page":"897","article-title":"Competing interests in the post 9\u201311 workplace: The new line between privacy and safety justice in a changed world","volume":"29","author":"Bloom","year":"2002","journal-title":"William Mitchell Law Review"},{"issue":"4","key":"2023062914013337400_zmad007-B12","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1080\/03637759609376396","article-title":"Communication work and electronic surveillance: A model for predicting panoptic effects","volume":"63","author":"Botan","year":"1996","journal-title":"Communication Monographs"},{"key":"2023062914013337400_zmad007-B13","first-page":"39","volume-title":"A networked self","author":"boyd","year":"2010"},{"key":"2023062914013337400_zmad007-B14","first-page":"58","volume-title":"Ableism and disability discrimination in new surveillance technologies","author":"Brown","year":"2022"},{"key":"2023062914013337400_zmad007-B15","volume-title":"Dark matters: On the surveillance of blackness","author":"Browne","year":"2015"},{"issue":"4","key":"2023062914013337400_zmad007-B16","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s12147-022-09302-0","article-title":"\u201cI have no room of my own\u201d: COVID-19 pandemic and work-from-home through a gender lens","volume":"39","author":"Chauhan","year":"2022","journal-title":"Gender Issues"},{"key":"2023062914013337400_zmad007-B17","first-page":"4875","author":"Chung","year":"2017"},{"issue":"2","key":"2023062914013337400_zmad007-B18","first-page":"979","article-title":"Intrusive monitoring: Employee privacy expectations are reasonable in Europe, destroyed in the United States","volume":"26","author":"Determann","year":"2011","journal-title":"Berkeley Technology Law Journal"},{"issue":"3","key":"2023062914013337400_zmad007-B19","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1177\/1059601115619548","article-title":"Toward understanding remote workers\u2019 management of work\u2013family boundaries: The complexity of workplace embeddedness","volume":"42","author":"Eddleston","year":"2017","journal-title":"Group & Organization Management"},{"key":"2023062914013337400_zmad007-B20","first-page":"235","volume-title":"International review of industrial and organizational psychology 1989","author":"Ganster","year":"1989"},{"issue":"3","key":"2023062914013337400_zmad007-B21","doi-asserted-by":"crossref","first-page":"20563051211033824","DOI":"10.1177\/20563051211033824","article-title":"Measuring Americans\u2019 comfort with research uses of their social media data","volume":"7","author":"Gilbert","year":"2021","journal-title":"Social Media + Society"},{"key":"2023062914013337400_zmad007-B22","author":"Gurley","year":"2022"},{"key":"2023062914013337400_zmad007-B151","author":"Helfer","year":"2018","journal-title":"Implementing a factorial survey in Qualtrics"},{"issue":"2","key":"2023062914013337400_zmad007-B23","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1111\/gwao.12200","article-title":"Doing gender in the \u2018new office\u2019: Doing gender in the \u2018new office","volume":"25","author":"Hirst","year":"2018","journal-title":"Gender, Work & Organization"},{"issue":"4","key":"2023062914013337400_zmad007-B24","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1177\/0049124191019004003","article-title":"The analysis of factorial surveys","volume":"19","author":"Hox","year":"1991","journal-title":"Sociological Methods & Research"},{"issue":"4","key":"2023062914013337400_zmad007-B25","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/572260.572267","article-title":"Workplace surveillance, privacy and distributive justice","volume":"30","author":"Introna","year":"2000","journal-title":"ACM SIGCAS Computers and Society"},{"key":"2023062914013337400_zmad007-B26","author":"Kitroeff","year":"2018"},{"issue":"3","key":"2023062914013337400_zmad007-B27","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1007\/s40685-020-00134-w","article-title":"Discriminated by an algorithm: A systematic review of discrimination and fairness by algorithmic decision-making in the context of HR recruitment and HR development","volume":"13","author":"K\u00f6chling","year":"2020","journal-title":"Business Research"},{"key":"2023062914013337400_zmad007-B28","volume-title":"Data and algorithms in the workplace: A primer on new technologies","author":"Kresge","year":"2020"},{"key":"2023062914013337400_zmad007-B29","author":"Lecher","year":"2019"},{"issue":"1","key":"2023062914013337400_zmad007-B30","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1111\/joms.12648","article-title":"COVID-19 and the new technologies of organizing: Digital exhaust, digital footprints, and artificial intelligence in the wake of remote work","volume":"58","author":"Leonardi","year":"2021","journal-title":"Journal of Management Studies"},{"issue":"2","key":"2023062914013337400_zmad007-B31","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1080\/01972243.2015.998105","article-title":"The contexts of control: Information, power, and truck-driving work","volume":"31","author":"Levy","year":"2015","journal-title":"The Information Society"},{"key":"2023062914013337400_zmad007-B32","author":"Long","year":"2020"},{"key":"2023062914013337400_zmad007-B33","author":"Lyttelton","year":"2020"},{"issue":"1","key":"2023062914013337400_zmad007-B34","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s00146-021-01290-1","article-title":"Bosses without a heart: socio-demographic and cross-cultural determinants of attitude toward Emotional AI in the workplace.","volume":"38","author":"Mantello","journal-title":"AI & society"},{"issue":"4","key":"2023062914013337400_zmad007-B35","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/s10551-012-1215-8","article-title":"Diminished or just different? A factorial vignette study of privacy as a social contract","volume":"111","author":"Martin","year":"2012","journal-title":"Journal of Business Ethics"},{"key":"2023062914013337400_zmad007-B36","first-page":"176","article-title":"Measuring privacy: An empirical test using context to expose confounding variables","volume":"18","author":"Martin","year":"2016","journal-title":"Columbia Science and Technology Law Review"},{"issue":"1","key":"2023062914013337400_zmad007-B37","first-page":"251","article-title":"What is it about location?","volume":"35","author":"Martin","year":"2020","journal-title":"Berkeley Technology Law Journal"},{"issue":"4","key":"2023062914013337400_zmad007-B38","first-page":"397","article-title":"Privacy without power: What privacy research can learn from surveillance studies. Surveillance","volume":"20","author":"Marwick","year":"2022","journal-title":"& Society"},{"issue":"7","key":"2023062914013337400_zmad007-B39","doi-asserted-by":"crossref","first-page":"1051","DOI":"10.1177\/1461444814543995","article-title":"Networked privacy: How teenagers negotiate context in social media","volume":"16","author":"Marwick","year":"2014","journal-title":"New Media & Society"},{"issue":"1","key":"2023062914013337400_zmad007-B40","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1111\/ijmr.12061","article-title":"Social media(tion) and the reshaping of public\/private boundaries in employment relations","volume":"18","author":"McDonald","year":"2016","journal-title":"International Journal of Management Reviews"},{"issue":"2","key":"2023062914013337400_zmad007-B41","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1177\/1532708608321481","article-title":"Dreams of control at a distance: Gender, surveillance, and social control","volume":"9","author":"Monahan","year":"2009","journal-title":"Cultural Studies \u2194 Critical Methodologies"},{"key":"2023062914013337400_zmad007-B42","volume-title":"Explainer: Algorithmic management in the workplace","author":"Nguyen","year":"2019"},{"key":"2023062914013337400_zmad007-B43","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum","year":"2010"},{"key":"2023062914013337400_zmad007-B44","author":"Parker","year":"2022"},{"key":"2023062914013337400_zmad007-B45","first-page":"119","article-title":"Preserving privacy in awareness systems","author":"Patil","year":"2004","journal-title":"Wissen in Aktion"},{"key":"2023062914013337400_zmad007-B46","first-page":"101","author":"Patil","year":"2005"},{"issue":"1","key":"2023062914013337400_zmad007-B47","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1080\/08934215.2021.1993947","article-title":"The toll of technology while working from home during COVID-19","volume":"35","author":"Pennington","year":"2022","journal-title":"Communication Reports"},{"key":"2023062914013337400_zmad007-B48","author":"Putzier","year":"2020"},{"key":"2023062914013337400_zmad007-B49","author":"Rosenblat","year":"2014"},{"issue":"27","key":"2023062914013337400_zmad007-B50","first-page":"3758","article-title":"Uber\u2019s drivers: Information asymmetries and control in dynamic work","volume":"10","author":"Rosenblat","year":"2016","journal-title":"International Journal of Communication"},{"key":"2023062914013337400_zmad007-B51","author":"Sannon","year":"2022"},{"issue":"1","key":"2023062914013337400_zmad007-B52","first-page":"1","article-title":"The myth of the privacy paradox","volume":"89","author":"Solove","year":"2021","journal-title":"George Washington Law Review"},{"key":"2023062914013337400_zmad007-B53","author":"Sorkin","year":"2022"},{"issue":"9","key":"2023062914013337400_zmad007-B54","doi-asserted-by":"crossref","first-page":"1074","DOI":"10.1002\/asi.24342","article-title":"\u201cI don\u2019t want someone to watch me while i\u2019m working\u201d: Gendered views of facial recognition technology in workplace surveillance","volume":"71","author":"Stark","year":"2020","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"2023062914013337400_zmad007-B55","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1016\/j.chb.2015.06.006","article-title":"Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences","volume":"52","author":"Sun","year":"2015","journal-title":"Computers in Human Behavior"},{"key":"2023062914013337400_zmad007-B56","author":"Van Dam","year":"2022"},{"issue":"4","key":"2023062914013337400_zmad007-B57","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1080\/08838151.2012.732140","article-title":"The impact of context collapse and privacy on social network site disclosures","volume":"56","author":"Vitak","year":"2012","journal-title":"Journal of Broadcasting & Electronic Media"},{"key":"2023062914013337400_zmad007-B58","article-title":"When do data collection and use become a matter of concern? A cross-cultural comparison of U.S. and Dutch privacy attitudes","volume":"17","author":"Vitak","year":"2023","journal-title":"International Journal of Communication"},{"issue":"3","key":"2023062914013337400_zmad007-B59","doi-asserted-by":"crossref","first-page":"205630512094825","DOI":"10.1177\/2056305120948250","article-title":"More than just privacy: Using contextual integrity to evaluate the long-term risks from COVID-19 surveillance technologies","volume":"6","author":"Vitak","year":"2020","journal-title":"Social Media + Society"},{"issue":"1","key":"2023062914013337400_zmad007-B60","doi-asserted-by":"crossref","first-page":"29","DOI":"10.24908\/ss.v21i1.15571","article-title":"Power, Stress, and Uncertainty: Experiences with and Attitudes toward Workplace Surveillance During a Pandemic","volume":"21","author":"Vitak","journal-title":"Surveillance & Society"},{"issue":"3","key":"2023062914013337400_zmad007-B61","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/j.ssresearch.2009.03.004","article-title":"25 years of factorial surveys in sociology: A review","volume":"38","author":"Wallander","year":"2009","journal-title":"Social Science Research"},{"issue":"1","key":"2023062914013337400_zmad007-B62","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1111\/apps.12290","article-title":"Achieving effective remote working during the COVID-19 pandemic: A work design perspective","volume":"70","author":"Wang","year":"2021","journal-title":"Applied Psychology"},{"key":"2023062914013337400_zmad007-B63","author":"Wartzman","year":"2019"},{"issue":"4","key":"2023062914013337400_zmad007-B64","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1002\/asi.24232","article-title":"A contextual approach to information privacy research","volume":"71","author":"Wu","year":"2020","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"2023062914013337400_zmad007-B65","author":"Zakrzewski","year":"2020"},{"key":"2023062914013337400_zmad007-B66","author":"Zickuhr","year":"2021"}],"container-title":["Journal of Computer-Mediated Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/jcmc\/article-pdf\/28\/4\/zmad007\/50739587\/zmad007.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/jcmc\/article-pdf\/28\/4\/zmad007\/50739587\/zmad007.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T14:09:03Z","timestamp":1688047743000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jcmc\/article\/doi\/10.1093\/jcmc\/zmad007\/7210235"}},"subtitle":[],"editor":[{"given":"Nancy","family":"Baym","sequence":"additional","affiliation":[]},{"given":"Nicole","family":"Ellison","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":67,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,6,12]]}},"URL":"https:\/\/doi.org\/10.1093\/jcmc\/zmad007","relation":{},"ISSN":["1083-6101"],"issn-type":[{"value":"1083-6101","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2023,7,1]]},"published":{"date-parts":[[2023,6,12]]},"article-number":"zmad007"}}