Top-Rated Free Essay
Preview

Covert Video Surveillance Applications for Employee Theft Detection: Why is This Controversial?

Better Essays
1476 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Covert Video Surveillance Applications for Employee Theft Detection: Why is This Controversial?
Do covert video surveillance applications, effectively contribute to traditional overt methods of employee theft detection, and why is this approach controversial? A study within the workplace of a UK national retail superstore.
Research Proposal
Employee theft is a pervasive and expensive problem to businesses; it is considerably hard to detect and precise numbers on the scale of the problem are generally difficult to attain (Beck and Peacock, 2009). Professor Joshua Bamfield published his estimate on the Centre for Retail Research website, that the cost to UK retailers resulting from employee theft during 2011 was £1,765 million (Bamfield, 2012).
The magnitude of employee theft, and its associated cost burden on an international level, was highlighted following the latest worldwide shrinkage survey. The Global Retail Theft Barometer 2011 survey was conducted throughout 43 countries. This included participants from leading retailers in all business sectors with combined sales of $948 billion. The survey showed a value of $119 billion towards a range of shrinkage issues, but perhaps the most staggering amount was the 35% or $41.65 billion from this shrinkage figure, which was thought to result from employee theft (Bamfield, 2011).
Companies have attempted to address the impact of this internal threat to their business assets, by considering all the crime prevention methods available to them. Of course, there is a plethora of preventative measures used by organisations in their effort to prevent employee theft in today’s workplace. However, since employees normally conduct their unscrupulous activities in secret, traditional crime prevention measures are sometimes insufficient to identify the culprit (Tackett, 2008).
Employers will occasionally turn to a surreptitious approach to tackle this problem. However, it is a company's use of covert video surveillance that continues to be a contentious issue, with regard to the opening of the Pandora’s box of ‘...intrusion to privacy that this approach constitutes’ (Thomas, 2003:58). It is this context that forms the bedrock of study, and a framework from which the researcher aims to contribute to the existing criminological research, albeit limited, area of Covert Video Surveillance (CVS) in the workplace.
The Research Problem
The use of a CVS approach by an organisation is cloaked in controversy, specifically, the debate around the rights of privacy towards those individuals being surreptitiously observed. Thomas adds ‘...Some [critics] go further and also view it as a form of entrapment’ (Thomas, 2003:58). Both Government agencies and private companies use CVS, as a targeted means to detect crimes that have a high probability of being carried out, at a specific time or place. Unfortunately, there are those employers who use CVS unscrupulously without regard to ‘an employee’s reasonable expectations of privacy’ (Tackett, 2008:8).
There appears to be conflicts of interest between the pressure to apprehend an employee committing repeated theft, and an individual’s right to privacy at work. Some employers fail to understand the importance of the governance required prior to using CVS, either through ambivalence or neglect of procedures. There are also cases where some companies will deploy covert cameras in such areas of the business, where employees have a reasonable expectation of privacy, such as staff rooms and changing rooms, for example (UNISON, 2004). However, many organisations do abide by a code of conduct and take employee rights to privacy seriously when deploying CVS.
Ebeling and Gibbs (2008:68) identify the purpose of a literature review as ‘to justify why a particular new study should be undertaken based on previous research’. Based on this premise, a provisional review was conducted towards identifying and interpreting the existing body of work on the extent of employee theft (Department of Criminology, 2009/10a). This revealed that this issue was a significant problem that affects all businesses (Beck and Peacock, 2009). Also, that Loss Prevention Managers (LPM's) have expressed concerns about the levels of employee theft, and rank the problem as the highest importance. However, they spent the largest portion of their time, ‘responding to current issues’ (Hayes, 2003:13). This seems to be consistent with other findings.
Further evaluation on the topic of CVS reveals there is a high level of ethical debate surrounding this practice. Interpretation of this literature, found the principal area of existing work is structured around the medical institutions application of CVS, and specifically covers the ethics around discreet observation of children vulnerable to parent abuse, whilst under controlled treatment in the hospital. A theme that seems to be common in many medical articles is ‘...the use of CVS as a medical diagnosis tool has been the subject of much ethical controversy since the practice first began in Britain in the 1980s' (Connelly, 2003:22).
Evaluation of subsequent sources of literature in this area reveals little criminological inquiries regarding the ethics surrounding the use of CVS, within the context of employee theft of the kind to be covered with this proposed study. Notably, a study using CVS as a primary data collection method in covertly observing potential shoplifters, failed to mention any ethical issues at all in surreptitiously observing unwitting shoppers (Dabney, Hollinger and Dugan, 2004).
Further review identified that there are both strong opponents and advocates to this particularly invasive approach. Most critics are those involved in the protection of human rights. For example, Connelly argues that ‘the institutionalisation of covert video surveillance (CVS), that is, hidden cameras, to observe [a suspected crime] is morally questionable’ (Connelly, 2003:21). The majority of advocates are in the main, from employing organisations; where their perception of wide powers to observe employees, often result in infringements to privacy.
Researchers studying the role of intruder alarms and CCTV in detecting commercial burglary, reported that the evidence showed the use of silent alarms combined with hidden cameras as a detection measure, can dramatically reduce commercial burglary (Coupe and Kaur, 2005). These findings are questionable due to the lack of attention to rights of privacy within the study.
The review identified that strict governance of covert surveillance has been implemented to deal with the potential intrusion to the privacy aspects of this approach. The Police, MI5 and other governmental agencies involved in covert surveillance, are strictly controlled by The Regulation of Investigatory Powers Act 2000 (RIPA). This was introduced to retain the right to privacy of an individual from the population under targeted government surveillance. This Act does not specifically include CVS per se; however, it is broadly covered within the regulations general provision ‘surveillance and covert human intelligence sources’, more precisely, ‘directed surveillance’ (RIPA, 2000:30).
The Act does not adequately relate to a private company’s use of CVS, and this uncertainty afforded employers wide powers when observing their employees. This resulted in certain organisations deploying CVS with little or no control mechanisms, and employee's rights to privacy were often infringed. Apprehended employees considered the intrusion of privacy aspect, which resulted in, court actions against their employer. However, the inadequate representation of private companies within the Act resulted in the courts maintaining the article ‘for the purpose of preventing or detecting crime’ (RIPA, 2000:37) with many cases held in favour of the employer (see, for example, McGowan v. Scottish Water, [2004] UKEAT 0007_04_2309).
In an attempt to bring private organisations use of CVS under control, and restrict their broad powers afforded to them by ambiguities within RIPA, the Information Commissioner produced guidance in the form of the Employment Practices Code (ICO, 2011). Under section 3.4 of this code, CVS in the workplace is specifically covered, with recommendations being offered to employers as good practice in dealing with a covert approach.
This code emphasises the responsibilities of employers when they consider implementing CVS within their premises. The salient points are: CVS must be pre-authorised by senior management; there must be reasonable justification and it should only be used as a last resort; it should be strictly targeted at obtaining evidence within a set timeframe, and must be removed once the investigation is complete (ICO, 2011).
The review highlighted how the controversy surrounding CVS lies with proportionality, justification and authorisation; ensuring that CVS is not abused towards targeting employee theft incidents. Therefore, the area of study will be structured around the contentious use of CVS in the workplace; its relationship to other overt methods of preventing employee theft, and whether this approach contributes to the company’s overall detection rate.
The study will also examine employers’ rationale in deciding on this sensitive technique. In addition, it will consider whether the whole issue lies around proportionality and whether CVS is carried out in appropriate circumstances, and with justifiable reason. It will look at organisational control mechanisms in complying with the employment practices code, and consider LPM’s duty-bound ethics, together with their attitude towards respecting the employee’s privacy when deploying this approach.
In response to these findings, and the researcher’s longstanding personal interest within the field of CVS, the proposed research will investigate the following provisional question:

You May Also Find These Documents Helpful

  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Behaviors such as transferring files from a work device to a home computer that is not protected or maintained to IT’s standards, using personal communications that are not as safe as corporate communications, talking about sensitive company matters where others can hear the conversation, and failing to use a laptop privacy guard when working remotely in a public place all invite information theft. Employees also fail to safeguard equipment such as laptop computers and portable storage devices, which can be lost or stolen (Cisco Systems, 2008, p 5).…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Triangle Shirtwaist Fire

    • 873 Words
    • 4 Pages

    Many shops were still in the hands of unscrupulous owners who disregarded basic workers’ rights and imposed unsafe working conditions on their employees…

    • 873 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The primary impact would be employee confidence in the company and a sudden drop in productivity resulting in the perceived lack of trust from the company. Most people consider unannounced surveillance a very significant violation of personal privacy. At the same time, employees who are aware of surveillance are less likely to perform unethical acts because they know they’re being watched. The company should seriously consider this aspect of the hidden surveillance.…

    • 822 Words
    • 4 Pages
    Good Essays
  • Good Essays

    B Ethics Discussion Post

    • 707 Words
    • 2 Pages

    1. If tracking employees through technology is not illegal, why should Megan be concerned if she is not involved in any misconduct?…

    • 707 Words
    • 2 Pages
    Good Essays
  • Good Essays

    You're the security chief at a manufacturing company that makes small metal hand tools. The plant employs roughly one hundred people. Management has told you that many tools have disappeared. According to company records, the plant produces approximately fifty thousand per day, but far fewer are actually being shipped out. After double-checking the figures to ensure their accuracy, you have concluded that pilferage is the only possible explanation. A meal detector positioned at the employee exit near the time clock would catch anyone trying to smuggle tools out of the factory. Because the purchase cost of a metal detector is prohibited, you have decided to rent one. Anyone caught stealing will immediately be fired, and a note to that effect will become part of the individual's personnel file. You don't want to create an atmosphere of hostility, but you do need to inform the employees about these developments. Write a memo to be posted on the main bulletin board and sent via e-mail.…

    • 276 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Luckily, in today's era, an employer no longer has to take necessary actions by doing some spying on his or her own - like hiding in dark corners while filming…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Kessler International Press Releases. (1999). Study shows 79% of employees steal from their employee. Retrieved on January 22, 2012 from http://www.investigation.com/press/press4.htm…

    • 1253 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Occupational Fraud impacts a company’s bottom line, reputation, employee productivity, and possibility of business continuity or security within a given industry. Another impact of occupational fraud is a company’s increased desire to prevent or deter fraud; which can also be cumbersome. Fraud is a crime of opportunity, fueled by greed and rationalization (Latshaw, Craig A, 2003). The penalties for fraud are usually not a deterrent from the crime, as most of those committing the crimes do not believe they will get caught. The solution to occupational fraud starts with making sure that there are internal controls in place that make it more difficult for fraud to occur. Periodic audits may be a deterrent, but the main deterrent is to set reasonable standards, work policies, and pay the may eliminate the rationalization of defrauding an…

    • 1086 Words
    • 5 Pages
    Better Essays
  • Better Essays

    The case presented only one instance when Fierro was caught stealing. Employee theft is difficult to catch and prove. The fact the Fierro was caught tends to lead someone to believe that Fierro probably stole before and/or will do so again. Employee theft is a lot like deer. For every one you see/detect, there is eight or more you do not see. As a result, American business lose between $5 billion to $10 billion per year (Employee Theft, 1984).…

    • 1198 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Employee monitoring has emerged as a necessity and yet as a very controversial issue due to the widespread use of technology. Employee monitoring is the act of watching and monitoring employees' actions during working hours using employer equipment/property. This phrase can be a little scary as an employee, where is the line? The restroom is their property; thankfully there are employers who know their boundaries. Legally employers are continuing to monitor their employees. The only issue that seems to be addressed is how much they can monitor them.…

    • 1403 Words
    • 6 Pages
    Better Essays
  • Good Essays

    In this study we will analyze why companies and individuals decide to embezzle money from companies and or people from sales that work is not yet completed. We will discuss what embezzlement is and who commits these types of crimes. This is a very sticky subject to many people as it can really affect their life in a negative manner. I believe this is a serious topic to look at and gain awareness of so we can stop these criminals from hurting us and our companies that provide jobs for so many.…

    • 358 Words
    • 2 Pages
    Good Essays
  • Good Essays

    One of the most neglected and poorly managed aspects of small business operation is security and loss prevention. Yet, according to U.S. Department of Commerce statistics, employee dishonesty alone causes 30 percent of all business failures. Add to that failures resulting from other crimes committed against company property, employees and customers and it 's easy to see why the true rate may actually exceed 60 percent.…

    • 7648 Words
    • 31 Pages
    Good Essays
  • Good Essays

    Just Walk on by

    • 422 Words
    • 2 Pages

    In “Snoopers at Work,” Bill Bryson explains how businesses and employers are legally allowed to invade your personal privacy. The author describes the three main reasons why both employers and employees keep a good eye on you while shopping or working. Greed of money, suspicious workers, and because the technology exists are main reasons you are constantly being watched. Bryson explained the precautions employers must take while using surveillance of their workers offices. This could be illegal in some states. Also, companies will make their own employees spy on fellow workers. Bryson gives an example of how a man was terminated from his place of employment because he gave another employee information on…

    • 422 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Carter Cleaning Company

    • 910 Words
    • 4 Pages

    Getting rid of employees for theft should include the involvement of proper authorities and should only be done when there is absolute proof of the theft and who committed it. Such an action will also send a message to the other employees that we will not tolerate theft of company resources. While many employers are hesitant to prosecute employees for theft, developing evidence with police and through the courts can be beneficial in providing future employers of the individual with truthful and factual information.…

    • 910 Words
    • 4 Pages
    Good Essays
  • Good Essays

    little brother watching

    • 359 Words
    • 2 Pages

    In “The LittleBrother is Watching You,” Miriam Schulman argues about the ethical issues of monitoring in work place is ethical or is it invading ones privacy. The author talks about a software that came out on the market that tracks employees Internet use. The software tracks the employees Internet use and categorize employees to constructive, unconstructive, or impartial. This Software is called the little brother. Lawfully, employees have little option. The 1986 Electronic Communications Privacy Act forbids unlawful interruption of numerous electronic communications, containing e-mail. Conversely, the act pardons service providers since it supplies, which is generally understood to involve organizations that offer e-mail and Internet access. An employee certainly doesn’t donate all of his or her privacy when entering the agency. So does monitoring become an ethical issue? Schulman argues the case for monitoring which includes electronic communications can pose other dangers for employers besides breached security and lost productivity. Sexual harassment cases also often hinge on allegations of a hostile work environment, which might be evidenced by employees downloading or displaying pornographic material from the Web or sending off-color e-mails. The article states, “We can't make corporations responsible for stopping unacceptable forms of behavior and then deny them the tools needed to keep an eye out for that behavior." Schulman also argues the case against workplace monitoring. Employers can create trust, and then employee behavior "will conform to certain norms, not as a result of being watched, but as a result of the care and respect which are part of the communal fabric." The bottom line is to know your corporate policy. If the organization give you a promise of privacy then that should be respected if not you should find somewhere else to work or do not use employee electronics for personal material.…

    • 359 Words
    • 2 Pages
    Good Essays