Show simple item record

“I Don’t Want Someone to Watch Me While I’m Working”: Gendered Views of Facial Recognition Technology in Workplace Surveillance

dc.contributor.authorStark, Luke
dc.contributor.authorStanhaus, Amanda
dc.contributor.authorAnthony, Denise L.
dc.date.accessioned2020-08-10T20:55:30Z
dc.date.availableWITHHELD_14_MONTHS
dc.date.available2020-08-10T20:55:30Z
dc.date.issued2020-09
dc.identifier.citationStark, Luke; Stanhaus, Amanda; Anthony, Denise L. (2020). "“I Don’t Want Someone to Watch Me While I’m Working”: Gendered Views of Facial Recognition Technology in Workplace Surveillance." Journal of the Association for Information Science and Technology 71(9): 1074-1088.
dc.identifier.issn2330-1635
dc.identifier.issn2330-1643
dc.identifier.urihttps://hdl.handle.net/2027.42/156216
dc.description.abstractEmployers are increasingly using information and communication technologies to monitor employees. Such workplace surveillance is extensive in the United States, but its experience and potential consequences differ across groups based on gender. We thus sought to identify whether self‐reported male and female employees differ in the extent to which they find the use of workplace cameras equipped with facial recognition technology (FRT) acceptable, and examine the role of privacy attitudes more generally in mediating views on workplace surveillance. Using data from a nationally representative survey conducted by the Pew Research Center, we find that women are much less likely than men to approve of the use of cameras using FRT in the workplace. We then further explore whether men and women think differently about privacy, and if perceptions of privacy moderate the relationship between gender and approval of workplace surveillance. Finally, we consider the implications of these findings for privacy and surveillance via embedded technologies, and how the consequences of surveillance and technologies like FRT may be gendered. Note: We recognize evaluations based on a binary definition of gender are invariably partial and exclusionary. As we note in our discussion of the study’s limitations, we were constrained by the survey categories provided by Pew.
dc.publisherJohn Wiley & Sons, Inc.
dc.title“I Don’t Want Someone to Watch Me While I’m Working”: Gendered Views of Facial Recognition Technology in Workplace Surveillance
dc.typeArticle
dc.rights.robotsIndexNoFollow
dc.subject.hlbsecondlevelInformation Science
dc.subject.hlbtoplevelSocial Sciences
dc.description.peerreviewedPeer Reviewed
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/156216/2/asi24342_am.pdfen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/156216/1/asi24342.pdfen_US
dc.identifier.doi10.1002/asi.24342
dc.identifier.sourceJournal of the Association for Information Science and Technology
dc.identifier.citedreferenceRuetschlin, C. & Asante‐Muhammad, D. ( 2015 ). “The retail race divide: How the retail industry is perpetuating racial inequality in the 21st century.” Retrieved from https://www.naacp.org/latest/retail-race-divide-the-retail-industry-is-perpetuating-racial-inequality/
dc.identifier.citedreferenceStark, L. ( 2016 ). The emotional context of information privacy. The Information Society, 32 ( 1 ), 14 – 27. http://doi.org/10.1080/01972243.2015.1107167
dc.identifier.citedreferenceStark, L. ( 2019 ). Facial recognition is the plutonium of AI. XRDS: Crossroads, the ACM Magazine for Students, 25 ( 3 ), 50 – 55. http://doi.org/10.1145/3313129
dc.identifier.citedreferenceStark, L., & Levy, K. ( 2018 ). The surveillant consumer. Media, Culture & Society, 105 ( 5 ), 016344371878198 – 016344371878119. http://doi.org/10.1177/0163443718781985
dc.identifier.citedreferenceTaylor, F. ( 1911 ). The principles of scientific management. New York: Harper & Brothers.
dc.identifier.citedreferenceThompson, E. P. ( 1967 ). Time, work‐discipline, and industrial capitalism. Past & Present, 38, 56 – 97.
dc.identifier.citedreferenceTicona, J., & Mateescu, A. ( 2018 ). Trusted strangers: Carework platforms’ cultural entrepreneurship in the on‐demand economy. New Media & Society, 20 ( 1 ), 4384 – 4404.
dc.identifier.citedreferenceTimmons, S. ( 2003 ). Nurses resisting information technology. Nursing Inquiry, 10 ( 4 ), 257 – 269.
dc.identifier.citedreferenceUllmann‐Margalit, E. ( 2008 ). The case of the camera in the kitchen: Surveillance, privacy, sanctions, and governance. Regulation & Governance, 2 ( 4 ), 425 – 444.
dc.identifier.citedreferenceWestin, A. F. ( 2003 ). Social and political dimensions of privacy. Journal of Social Issues, 59 ( 2 ), 431 – 453.
dc.identifier.citedreferenceWu, P. F., Vitak, J., & Zimmer, M. T. ( 2020 ). A contextual approach to information privacy research. Journal of the Association for Information Science and Technology. Advance online publication. http://doi.org/10.1002/asi.24232
dc.identifier.citedreferenceYates, J. ( 1993 ). Control through communication. Baltimore, MD: Johns Hopkins University Press.
dc.identifier.citedreferenceZerubavel, E. ( 2006 ). The elephant in the room. New York: Oxford University Press.
dc.identifier.citedreferenceZimmer, M. ( 2007 ). Function creep 101: Surveillance cameras and social norms. Retrieved from http://www.michaelzimmer.org/2007/06/30/function-creep-101-surveillance-cameras-and-social-norms/
dc.identifier.citedreferenceZuboff, S. ( 1988 ). In the age of the smart machine. New York: Basic Books.
dc.identifier.citedreferenceZuboff, S. ( 2019 ). The age of surveillance capitalism. New York: PublicAffairs/Hachette.
dc.identifier.citedreferenceZureik, E. ( 2003 ). Theorizing surveillance: The case of the workplace. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk and digital discrimination (pp. 31 – 56 ). London: Routledge.
dc.identifier.citedreferenceZureik, E. ( 2007 ). Surveillance studies: From metaphors to regulation to subjectivity. Contemporary Sociology, 36 ( 2 ), 112 – 115.
dc.identifier.citedreferenceAdib, A., & Guerrier, Y. ( 2003 ). The interlocking of gender with nationality, race, ethnicity and class: Narratives of women in hotel work. Gender, Work Organization, 10 ( 4 ), 413 – 432.
dc.identifier.citedreferenceAjunwa, I., Crawford, K., & Schultz, J. ( 2017 ). Limitless worker surveillance. California Law Review, 105, 735 – 776.
dc.identifier.citedreferenceAjunwa, I., & Greene, D. ( 2019 ). Platforms at work: Automated hiring platforms and other new intermediaries in the Organization of Work. In S. P. Vallas & A. Kovalainen (Eds.), Work and labor in the digital age (Vol. 33, pp. 61 – 91 ). Bradford, UK: Emerald.
dc.identifier.citedreferenceAllen, A. L. ( 1988 ). Uneasy access: Privacy for women in a free society. New York: Rowan & Littlefield.
dc.identifier.citedreferenceAnderson, E. ( 2017 ). Private government: How employers rule our lives (and why we don’t talk about it). Princeton, NJ: Princeton University Press.
dc.identifier.citedreferenceAndrejevic, M. ( 2006 ). The discipline of watching: Detection, risk, and lateral surveillance. Critical Studies in Media Communication, 23 ( 5 ), 391 – 407.
dc.identifier.citedreferenceAngwin, J. ( 2010 ). The what they know series. Retrieved from http://juliaangwin.com/the-what-they-know-series/
dc.identifier.citedreferenceAnteby, M., & Chan, C. K. ( 2018 ). A self‐fulfilling cycle of coercive surveillance: Workers’ invisibility practices and managerial justification. Organization Science, 29 ( 2 ), 247 – 263.
dc.identifier.citedreferenceAnthony, D., Campos‐Castillo, C., & Horne, C. ( 2017 ). Toward a sociology of privacy. Annual Review of Sociology, 43 ( 1 ), 1 – 21.
dc.identifier.citedreferenceAnthony, D., Stablein, T., & Carian, E. K. ( 2015 ). Big brother in the information age. IEEE Security & Privacy, 13 ( 4 ), 12 – 19.
dc.identifier.citedreferenceAttewell, P. ( 1987 ). Big brother and the sweatshop: Computer surveillance in the automated office. Sociological Theory, 5 ( 1 ), 87 – 100.
dc.identifier.citedreferenceBall, K. ( 2010 ). Workplace surveillance: An overview. Labor History, 51 ( 1 ), 87 – 106.
dc.identifier.citedreferenceBall, K., Daniel, E. M., & Stride, C. ( 2012 ). Dimensions of employee privacy: An empirical study. Information Technology and People, 25 ( 4 ), 376 – 394.
dc.identifier.citedreferenceBall, K., & Webster, F. (Eds.). ( 2003 ). The intensification of surveillance: Crime, terrorism and warfare in the information era. London: Pluto.
dc.identifier.citedreferenceBarrett, D. ( 2013, July 10). One surveillance camera for every 11 people in Britain, says CCTV survey. The Daily Telegraph. Retrieved from https://www.telegraph.co.uk/technology/10172298/One-vsurveillance-camera-for-every-11-people-in-Britain-says-CCTV-survey.html
dc.identifier.citedreferenceBayard de Volo, L. ( 2003 ). Service and surveillance: Infrapolitics at work among casino cocktail waitresses. Social Politics: International Studies in Gender, State & Society, 10 ( 3 ), 346 – 376.
dc.identifier.citedreferenceBeniger, J. ( 1989 ). The control revolution: Technological and economic origins of the information society. Cambridge, MA: Harvard University Press.
dc.identifier.citedreferenceBerdahl, J. L., & Moore, C. ( 2006 ). Workplace harassment: Double jeopardy for minority women. Journal of Applied Psychology, 91 ( 2 ), 426 – 436.
dc.identifier.citedreferenceBernstein, E. S. ( 2012 ). The transparency paradox: A role for privacy in organizational learning and operational control. Administrative Science Quarterly, 57 ( 2 ), 181 – 216.
dc.identifier.citedreferenceBernstein, E. S. ( 2017 ). Making transparency transparent: The evolution of observation in management theory. Academy of Management Annals, 11 ( 1 ), 217 – 266.
dc.identifier.citedreferenceBrayne, S. ( 2014 ). Surveillance and system avoidance: Criminal justice contact and institutional attachment. American Sociological Review, 79 ( 3 ), 367 – 391.
dc.identifier.citedreferenceBrooks, C., & Manza, J. ( 2013 ). A broken public? Americans’ responses to the great recession. American Sociological Review, 78 ( 5 ), 727 – 748.
dc.identifier.citedreferenceBrowne, S. ( 2015 ). Dark matters: On the surveillance of blackness. Durham, NC: Duke University Press.
dc.identifier.citedreferenceBuolamwini, J., & Gebru, T. ( 2018 ). Gender shades: Intersectional accuracy disparities in commercial gender classification. Proceedings of Machine Learning Research, 81, 1 – 15.
dc.identifier.citedreferenceBurawoy, M. ( 1979 ). Manufacturing consent: Changes in the labor process under monopoly capitalism. Chicago: University of Chicago Press.
dc.identifier.citedreferenceCitron, D. K. ( 2008 ). Technological due process. Washington University Law Review, 85, 1249 – 1313.
dc.identifier.citedreferenceConrad, K. ( 2009 ). Surveillance, gender, and the virtual body in the information age. Surveillance & Society, 6 ( 4 ), 380 – 387.
dc.identifier.citedreferenceDubrofsky, R. E., & Magnet, S. A. ( 2015 ). Introduction: Feminist surveillance studies: critical interventions. In R. E. Dubrofsky & S. A. Magnet (Eds.), Feminist surveillance studies (pp. 1 – 21 ). Durham, NC: Duke University Press.
dc.identifier.citedreferenceEdwards, S., Dockterman, E., & Sweetland, H. ( 2017 ). “TIME Person of the Year 2018: The Silence Breakers” Time. Retrieved from https://time.com/time-person-of-the-year-2017-silence-breakers/
dc.identifier.citedreferenceEgan, R. D. ( 2004 ). Eyeing the scene: The uses and (RE)uses of surveillance cameras in an exotic dance club. Critical Sociology, 30 ( 2 ), 299 – 319.
dc.identifier.citedreferenceEtzioni, A. ( 1999 ). The limits of privacy. New York: Basic Books.
dc.identifier.citedreferenceEubanks, V. ( 2018 ). Automating inequality: How high‐tech tools profile, police, and punish the poor. New York: St. Martin’s.
dc.identifier.citedreferenceFisher, J. A., & Monahan, T. ( 2008 ). Tracking the social dimensions of RFID systems in hospitals. International Journal of Medical Informatics, 77 ( 3 ), 176 – 183.
dc.identifier.citedreferenceFowler, G.A. ( 2019 ). The spy in your wallet: Credit cards have a privacy problem. The Washington Post. Retrieved from https://beta.washingtonpost.com/technology/2019/08/26/spyyour-wallet-credit-cards-have-privacy-problem/
dc.identifier.citedreferenceFriedman, B., Höök, K., Gill, B., Eidmar, L., Prien, C. S., & Severson, R. ( 2008 ). Personlig integritet: A comparative study of perceptions of privacy in public places in Sweden and the United States. Proceedings of the 5th Nordic conference on human‐computer interaction: Building bridges (pp. 142–151). New York: ACM. http://doi.org/10.1145/1463160.1463176
dc.identifier.citedreferenceGates, K. ( 2011 ). Our biometric future: Facial recognition technology and the culture of surveillance. New York: New York University Press.
dc.identifier.citedreferenceGellman, B., & Poitras, L. ( 2013, June 7). U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. Washington Post. Retrieved from https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?utm_term=.83e3f6c31983
dc.identifier.citedreferenceGilliom, J. ( 2001 ). Overseers of the poor. Chicago: University of Chicago Press.
dc.identifier.citedreferenceGoold, B. J. ( 2004 ). CCTV and policing. Oxford, UK: Oxford University Press.
dc.identifier.citedreferenceGreenwald, G. ( 2013, June 7). NSA collecting phone records of millions of Verizon customers daily. The Guardian. Retrieved from https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
dc.identifier.citedreferenceHaggerty, K. D., & Ericson, R. V. ( 2000 ). The surveillant assemblage. British Journal of Sociology, 51 ( 4 ), 605 – 622. http://doi.org/10.1080/00071310020015280
dc.identifier.citedreferenceHarmon, A. ( 2019, July 8). As cameras track Detroit’s residents: A Debate Ensues over Racial Bias. The New York Times. Retrieved from https://www.nytimes.com/2019/07/08/us/detroit-facial-recognition-cameras.html.
dc.identifier.citedreferenceHicks, M. ( 2019 ). Hacking the Cis‐tem. IEEE Annals of the History of Computing, 41 ( 1 ), 20 – 33. http://doi.org/10.1109/MAHC.2019.2897667
dc.identifier.citedreferenceHirst, A., & Schwabenland, C. ( 2017 ). Doing gender in the new office. Gender, Work and Organization, 25 ( 2 ), 159 – 176. http://doi.org/10.1111/gwao.12200
dc.identifier.citedreferenceIgo, S. ( 2018 ). The known citizen: A history of privacy in modern America. Cambridge, MA: Harvard University Press.
dc.identifier.citedreferenceKeyes, O. ( 2018 ). The Misgendering Machines. Proceedings of the ACM on Human‐Computer Interaction, 2, 22. http://doi.org/10.1145/3274357
dc.identifier.citedreferenceKoskela, H. ( 2000 ). “The gaze without eyes”: Video‐surveillance and the changing nature of urban space. Progress in Human Geography, 24 ( 2 ), 243 – 265. http://doi.org/10.1191/030913200668791096
dc.identifier.citedreferenceKoskela, H. ( 2003 ). “Camera” — The contemporary urban Panopticon. Surveillance & Society, 1 ( 3 ), 292 – 313. http://doi.org/10.24908/ss.v1i3.3342
dc.identifier.citedreferenceKwet, M. ( 2019, June 14). In stores, secret surveillance tracks your every move. The New York Times. Retrieved from https://www.nytimes.com/interactive/2019/06/14/opinion/bluetooth-wireless-tracking-privacy.html
dc.identifier.citedreferenceLake, J. ( 2016 ). The face that launched a thousand lawsuits: The American women who forged a right to privacy. New Haven, CT: Yale University Press.
dc.identifier.citedreferenceLee, M. K., Kusbit, D., Metsky, E., & Dabbish, L. ( 2015, April). Working with machines: The impact of algorithmic and data‐driven management on human workers. Paper presented at CHI ’15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul: Republic of Korea. https://doi.org/10.1145/2702123.2702548
dc.identifier.citedreferenceLevy, K. ( 2015 ). The contexts of control: Information, power, and truck‐driving work. The Information Society, 31 ( 2 ), 160 – 174.
dc.identifier.citedreferenceLevy, K., & Barocas, S. ( 2018 ). Refractive surveillance: Monitoring customers to manage workers. International Journal of Communication, 12, 1166 – 1188.
dc.identifier.citedreferenceLohr, S. ( 2014, June 21). Workplace surveillance and the “transparency paradox.” The New York Times. Retrieved from http://bits.blogs.nytimes.com/2014/06/21/workplace-surveillance-and-the-transparency-paradox/?_r=0
dc.identifier.citedreferenceLyon, D. ( 1994 ). The electronic eye: The rise of surveillance society. Minneapolis, MN: University of Minnesota Press.
dc.identifier.citedreferenceLyon, D. ( 2007 ). Surveillance studies: An overview. Malden, MA: Polity.
dc.identifier.citedreferenceLyon, D. ( 2014 ). Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data & Society, 1 ( 2 ), 1 – 13. http://doi.org/10.1177/2053951714541861
dc.identifier.citedreferenceMacKinnon, C. A. ( 1979 ). Sexual harassment of working women. New Haven, CT: Yale University Press.
dc.identifier.citedreferenceMacKinnon, C. A. ( 2005 ). Women“s lives, men”s Laws. Cambridge, MA: Belknap Press/Harvard University Press.
dc.identifier.citedreferenceMagnet, S. A. ( 2011 ). When biometrics fail: Gender, race, and the technology of identity. Durham, NC: Duke University Press.
dc.identifier.citedreferenceMartin, P. Y. ( 2016 ). Mobilizing masculinities: Women’s experiences of men at work. Organization, 8 ( 4 ), 587 – 618. http://doi.org/10.1177/135050840184003
dc.identifier.citedreferenceMarx, G. ( 2003 ). Some information age techno‐fallacies. Journal of Contingencies and Crisis Management, 11 ( 1 ), 25 – 31. http://doi.org/10.1111/1468-5973.1101005
dc.identifier.citedreferenceMarx, G. T. ( 2009 ). A tack in the shoe and taking off the shoe neutralization and counter‐neutralization dynamics. Surveillance & Society, 6 ( 3 ), 294 – 306. http://doi.org/10.24908/ss.v6i3.3286
dc.identifier.citedreferenceMcCahill, M., & Norris, C. ( 2003 ). Estimating the extent, sophistication and legality of CCTV in London. In M. Gill (Ed.), CCTV (pp. 51 – 66 ). Leicester, UK: Perpetuity.
dc.identifier.citedreferenceMcLaughlin, H., Uggen, C., & Blackstone, A. ( 2012 ). Sexual harassment, workplace authority, and the paradox of power. American Sociological Review, 77 ( 4 ), 625 – 647. http://doi.org/10.1177/0003122412451728
dc.identifier.citedreferenceMonahan, T. ( 2009 ). Identity theft vulnerability: Neoliberal governance through crime construction. Theoretical Criminology, 13 ( 2 ), 155 – 176. http://doi.org/10.1177/1362480609102877
dc.identifier.citedreferenceMozur, P. ( 2019, April). One month, 500,000 face scans: How China is using A.I. to profile a minority. The New York Times. Retrieved from https://www.nytimes.com/2019/04/14/technology/china-surveillance-artificial-intelligence-racial-profiling.html
dc.identifier.citedreferenceNippert‐Eng, C. ( 2010 ). Islands of privacy. Chicago: University of Chicago Press.
dc.identifier.citedreferenceNissenbaum, H. ( 2010 ). Privacy in context: Technology, policy, and the integrity of social life. Palo Alto, CA: Stanford Law.
dc.identifier.citedreferenceNissenbaum, H. ( 2011 ). A contextual approach to privacy online. Daedalus, 140 ( 4 ), 32 – 48.
dc.identifier.citedreferenceNissenbaum, H. ( 2015 ). Respecting context to protect privacy: Why meaning matters. Science and Engineering Ethics, 109 ( 4 ), 1 – 22. http://doi.org/10.1007/s11948-015-9674-9
dc.identifier.citedreferenceO’Neil, C. ( 2017 ). Weapons of math destruction. New York: Broadway.
dc.identifier.citedreferenceOrtiz, S. Y., & Roscigno, V. J. ( 2016 ). Discrimination, women, and work: Processes and variations by race and class. The Sociological Quarterly, 50 ( 2 ), 336 – 359. http://doi.org/10.1111/j.1533-8525.2009.01143.x
dc.identifier.citedreferencePasquale, F. ( 2015 ). The black box society. Cambrige, MA: Harvard University Press.
dc.identifier.citedreferenceRainie, L., & Duggan, M. ( 2015 ). Privacy and information sharing. Retrieved from Pew Research Center website: http://www.pewinternet.org/2016/01/14/privacy-and-information-sharing/
dc.identifier.citedreferenceRosenblat, A., Kneese, T., & Boyd, D. ( 2014 ). Workplace surveillance (Data & Society Working Paper). New York: Data & Society Research Institute.
dc.identifier.citedreferenceRosenblat, A., & Stark, L. ( 2016 ). Algorithmic labor and information asymmetries: A case study of Uber’s drivers. The International Journal of Communication, 10, 3758 – 3784.
dc.identifier.citedreferenceRule, J. B. ( 1973 ). Private lives and public surveillance. London: Allen Lane.
dc.identifier.citedreferenceScheuerman, M. K., Paul, J. M., & Brubaker, J. R. ( 2019 ). How computers see gender. Proceedings of the ACM on Human‐Computer Interaction, 3 (CSCW), 1 – 33. http://doi.org/10.1145/3359246
dc.identifier.citedreferenceSewell, G., Barker, J. R., & Nyberg, D. ( 2012 ). Working under intensive surveillance: When does ‘measuring everything that moves’ become intolerable? Human Relations, 65 ( 2 ), 189 – 215.
dc.identifier.citedreferenceSimon, H. A. ( 1965 ). The shape of automation for men and management. New York: Harper & Row.
dc.identifier.citedreferenceSinger, N. ( 2019, May 9). Amazon flunks children’s privacy, advocacy groups charge. The New York Times. Retrieved from https://www.nytimes.com/2019/05/09/technology/amazon-childrens-privacy-echo-dot-kids.html
dc.identifier.citedreferenceSolon, O. ( 2017, 6 November). Big Brother isn’t just watching: Workplace surveillance can track your every move. The Guardian. Retrieved from https://www.theguardian.com/world/2017/nov/06/workplace-surveillance-big-brother-technology
dc.identifier.citedreferenceStanton, J. M., & Stam, K. ( 2003 ). Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives. Surveillance & Society, 1 ( 2 ), 152 – 190.
dc.identifier.citedreferenceStanton, J. M., & Stam, K. ( 2006 ). The visible employee: Using workplace monitoring and surveillance to protect information assets–without compromising employee privacy or trust. Medford, NJ: Information Today.
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.