Case study: evaluating the use of an electronic messaging system in business.
|
|
|
- Julius Norman
- 10 years ago
- Views:
Transcription
1 Loughborough University Institutional Repository Case study: evaluating the use of an electronic messaging system in business. This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: JACKSON, T., DAWSON, R. and WILSON, D., Case study: evaluating the use of an electronic messaging system in business. Proceedings of the Conference on Empirical Assessment in Software Engineering, EASE 2001, Keele University, UK, April 2001, pp Metadata Record: Publisher: c EASE Please cite the published version.
2 This item was submitted to Loughborough s Institutional Repository by the author and is made available under the following Creative Commons Licence conditions. For the full text of this licence, please go to:
3 Case Study: Evaluating the use of an Electronic Messaging System in Business Thomas Jackson 1,2, Ray Dawson 2 and Darren Wilson 1 1 Danwood Group, Lincoln, UK 2 Loughborough University, Leics., UK ([email protected]) )- Abstract This experience report outlines problems encountered whilst monitoring employees communication and how they were overcome. Ethical issues were raised in the recording of individual messages. To overcome the Hawthorne effect but also to take into account the ethical considerations of monitoring employees a set of guidelines for electronic monitoring is suggested. The value of measuring the communication processes through electronic monitoring has been shown at the Danwood Group. The analysis of has enabled the effect on employee time to be quantified and has given some surprising results. This has lead to a series of recommendations that will enable companies to make better use of communication and increase employee productivity. Introduction Electronic messaging is becoming an integral part of the communication structure within organisations, but the costs and benefits are not being assessed to show when it is a more effective communication process than traditional methods. Communication is carried out in many different forms, but the common underlying motive of communication is to improve working practices and to increase efficiency. This experience report resulted from a study of the communication methods within an organisation that retails office solutions: The Danwood Group. The investigation of the benefits of relative to traditional communication methods forms a study within the company to establish the value of such analysis. The company expects that a basic understanding gained from this study will provide the data for communication planning and corrective actions for the problems uncovered. Obtaining metrics of how employees communicate at work can be extremely difficult. Due to the nature of communication at work, there is not only business content in s but also personal and confidential material that an employee would not want their employer to read. Detailed planning must take place if these problems are to be overcome. Considerations must be given in how to obtain the metrics: - without distorting the data without disrupting the employees work without loosing trust between the employees and employers having valid reasons behind gaining the metrics that both the employer and most importantly the employees can understand The Effects of Monitoring Employees In an early, , productivity study in Western Electric's Hawthorne plant near Chicago researchers discovered that their own presence affected the outcome of the research. In determining the effects of various environmental parameters on productivity, the researchers tried raising the light level, and they noted that the productivity went up. Then they tried lowering the light level, and they noted that productivity went up higher still. In this case, so long as the study was in progress, productivity increased. The term "Hawthorne Effect" was coined to define the influence of the researcher's presence
4 on the outcome of the study, which was their attention to the employees, increased employee productivity (Mayo, 1933). Early research carried out by the authors showed that the employees performances changed when they thought they were being monitored. At the time of the research users were made aware that the subject line of their was being recorded for research purposes. In order to record the metrics a special application The Danwood Mail, was written by one of the authors to analyse the users activities whilst using the package for communication. The program recorded more that than just the subject line and actually recorded detailed information about each received and sent (Jackson T.W. et al., 1999). After only a week of monitoring, the employees using the application began leaving the subject line blank. In some cases the subject line was only left blank when the was non-business related. Monitoring clearly influenced the employees in making them find ways of disguising their activities and in turn affected the communication study. Choosing Non-Intrusive Monitoring Equipment There were numerous ways the metrics could have been recorded. The most obvious way was to observe the employees at their desk, recording the various activities by capturing them on a camcorder. Another possibility would have been to have an actual person discretely watching the employee from a distance. These methods would have probably produced distorted results due to the employee knowing they are being monitored through the constant presence of the monitor (Mayo, 1933). The most appropriate option was to use computer software to monitor the employee. Many of the software monitoring applications considered had a number of restrictions, such as, lack of reliability, no access to the monitoring source code, inappropriate system tray icons, being too slow or having excessive amounts of media required to record an employee at work for a full day. It was decided WinVNC (Cambridge, 2000) would be used with a video recorder because it was a stable product with access to the source code. The original WinVNC program was modified slightly by one of the authors to remove the icon shown in Figure 1 from the system tray so the employees would not know when they were being monitored. Figure 1 Shows the WinVNC icon that was later removed from the system tray Building the Trust To a majority of employees within the workplace monitoring their activities is not acceptable. It can be regarded as an intrusion into personal privacy and, potentially, through its use, the employees could lose their jobs if the company does not approve of their activities. This type of thinking by the employee is potentially damaging for the company and will hinder productivity if lines of communication are restricted through being monitored. In the case of the Danwood Group all employees had signed a staff agreement that they can be monitored, but nevertheless there is an ethical issue at stake and it is important for employers to build trust between themselves and the employees. One possible resolution of the ethical problem is to employ a third party to carryout all monitoring of employees, with employees being made aware that no individual results will be disclosed to management and employees being informed of the benefits that monitoring will bring to the workplace.
5 This was the solution used at the Danwood Group with the monitoring carried out by Loughborough University. Management were given the overall statistics but no information on any one individual. Summary of the Results Average Usage Average Interactivity (Seconds) Usage 17:00 15:00 13:00 11:00 9:00 7:00 Time of Day Figure 2 usage throughout the day (The graph is measured in interactivity, where interactivity is classed as a user reading or composing a message including reply, reply all and forwarding). The monitoring of the gave some interesting and surprising results. The commonly held view that the main advantage of is that it allowed users to manage their time by accessing when it is most convenient with the minimum interruption to other daily activities. It was found, however, that most employees had their application configured to check every five minutes, and to then give an audible and visual interrupt if incoming mail is received. 70% of employees would then react to the interrupt by reading their within 6 seconds of the interrupt. 85% of employees reacted within two minutes. On average, the recovery time taken to resume normal activity after completing their activity was 64 seconds. This showed that although the disruptive effect of is not as great as the interruption from the telephone the disruption is still significant (DeMarco T and Lister, 1999). For example, the average time lost over a whole year for non-business , which accounted for 43% of the recorded, would be around two working weeks. It was also found that activity (reading and composing s) had two peak periods in the day, at the start and end of the working day, shown in Figure 2. This suggests that employees could minimise the interruption to other work by checking less often, concentrating their activity mainly at each end of the working day. The benefit to the company is that it can now consider giving training and issuing guidelines to employees to make more efficient use of their time when using . Conclusion To overcome the Hawthorne effect but to also take into account the ethical considerations of monitoring employees a set of guidelines for electronic monitoring is suggested: 1) An independent party should carry out any electronic monitoring 2) Monitoring tools should be stable and not cause distribution or raise suspicion of being monitored 3) After monitoring the employee s should be told of their results and also told the results will not be individually disclosed to the management or other employees within the company 4) The monitoring should be undertaken with the aim of mutual benefit for all employees by providing information on ways to work more effectively not as a means of spying on individuals.
6 The value of measuring the communication processes through electronic monitoring has been shown at the Danwood Group. The analysis of has enabled the effect on employee time to be quantified and has given some surprising results. This has lead to a series of recommendations that will enable companies to make better use of communication and increase employee productivity. Bibliography Cambridge, A. T. L. (2000) AT&T Laboratories Cambridge, DeMarco T and Lister, T. (1999) Peopleware. Productive Projects and Teams 2nd Ed., Dorset House Publishing Company, New York. Jackson T.W., Dawson R and D, W. (1999) In INSPIRE - Training and Teaching for the understanding of Software Quality, Vol. 4 Crete, pp Mayo, E. (1933) The Human Problems of an Industrial Civilization, New York: Macmillan.
Solar radiation data validation
Loughborough University Institutional Repository Solar radiation data validation This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: MCKENNA, E., 2009.
Reections on a benchmarking survey of research support provided by 1994 Group libraries
Loughborough University Institutional Repository Reections on a benchmarking survey of research support provided by 1994 Group libraries This item was submitted to Loughborough University's Institutional
Master Class 4 - Introduction to Intellectual Property and Copyright Wilna Macmillan, Director of Client Services, Library
IP and Research Data Managing your research data Consider early and review often Master Class 4 - Introduction to Intellectual Property and Copyright Wilna Macmillan, Director of Client Services, Library
Accounting for ethical, social, environmental and economic issues: towards an integrated approach
Accounting for ethical, social, environmental and economic issues: towards an integrated approach Research Executive Summaries Series Vol. 2, No. 12 By Professor Carol A Adams La Trobe University and Dr
Classication and selection of tools for quality knowledge management
Loughborough University Institutional Repository Classication and selection of tools for quality knowledge management This item was submitted to Loughborough University's Institutional Repository by the/an
STORRE: Stirling Online Research Repository Policy for etheses
STORRE: Stirling Online Research Repository Policy for etheses Contents Content and Collection Policies Definition of Repository Structure Content Guidelines Submission Process Copyright and Licenses Metadata
WHITE PAPER. Electronic Document Management for Design Data
September 2012 WHITE PAPER. for Managing design data is a key concern for every organisation in design and construction. Poor control can result in increased costs and greater risks. This white paper looks
Long period analysis of construction skills supply in Zambia
Loughborough University Institutional Repository Long period analysis of construction skills supply in Zambia This item was submitted to Loughborough University's Institutional Repository by the/an author.
Problems of practice-based Doctorates in Art and Design: a viewpoint from Finland
Loughborough University Institutional Repository Problems of practice-based Doctorates in Art and Design: a viewpoint from Finland This item was submitted to Loughborough University's Institutional Repository
ESRC Research Data Policy
ESRC Research Data Policy Introduction... 2 Definitions... 2 ESRC Research Data Policy Principles... 3 Principle 1... 3 Principle 2... 3 Principle 3... 3 Principle 4... 3 Principle 5... 3 Principle 6...
Introducing ITIL Availability Management. Author : George Ritchie, Serio Ltd email: george dot- ritchie at- seriosoft.com
Introducing ITIL Availability Management Author : George Ritchie, Serio Ltd email: george dot- ritchie at- seriosoft.com Copyright Serio Ltd 2005-2009 Page 1 Copyright, trademarks and disclaimers Serio
ESKITP714401 Implement procedures and standards relating to metrics for IT service delivery
Overview This sub-discipline covers the competencies required to perform performance metrics. Monitoring service level performance is a complex task requiring collection of data, detailed analysis, and
SYNERGY GAS CUSTOMER CHARTER. Small Use Business Customers
SYNERGY GAS CUSTOMER CHARTER Small Use Business Customers If you don t speak English and need help with this guide, call the telephone interpreter service (TIS National) on 13 14 50 to arrange an interpreter.
SAS TRUSTEE CORPORATION ( STC )
SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...
Module 1 Study Guide
Module 1 Study Guide Introduction to OSA Welcome to your Study Guide. This document is supplementary to the information available to you online, and should be used in conjunction with the videos, quizzes
RISK MANAGEMENT POLICY
RISK MANAGEMENT POLICY 1. INTRODUCTION 1.1 This Policy sets out Marindi Metals Ltd ( Marindi or the Company ) system of risk oversight, management of material business risks and internal control. 1.2 Marindi
Release 1. ICAICT814A Develop cloud computing strategies for a business
Release 1 ICAICT814A Develop cloud computing strategies for a business ICAICT814A Develop cloud computing strategies for a business Modification History Release Release 1 Comments This version first released
Internet, Social Networking and Telephone Policy
Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social
Change Management Overview
Leadership & Strategy» Leading Change» Strategic Change» Change Management Overview Change Management Overview Change is one of the few constants. Technology, civilisations and organisations continually
MANAGING THE RELATIONSHIP: DOES TRUST LEAD TO COOPERATION? Jane Roberts and Bill Merrilees Griffith University
MANAGING THE RELATIONSHIP: DOES TRUST LEAD TO COOPERATION? Jane Roberts and Bill Merrilees Griffith University Track: Market Orientation and Relationship Marketing ABSTRACT This paper examines the relationship
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Appendix 10: Improving the customer experience
Appendix 10: Improving the customer experience Scottish Water is committed to delivering leading customer service to all of our customers. This means we deliver the following activities: We will ensure
HP Laptop & Apple ipads
Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview
http://espace.library.curtin.edu.au:80/r?func=dbin-jump-full&local_base=gen01-era02&object_id=187303
Citation: Robertson, Rachel. 2012. Using knowledge networks to teach online writing skills in the professional writing classroom, in Herrington, A. and Schrape, J. and Singh, K. (ed), Engaging students
E-mail archiving for records management
Loughborough University Institutional Repository E-mail archiving for records management This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: BOOTH,
Academic Course Description. SE2003 Software Project Management Second Semester, 2014-15 (Even semester)
Course (catalog) description: Academic Course Description SRM University Faculty of Engineering and Technology Department of Software Engineering SE2003 Software Project Management Second Semester, 2014-15
Problem Management Fermilab Process and Procedure
Management Fermilab Process and Procedure Prepared for: Fermi National Laboratory June 12, 2009 Page 1 of 42 GENERAL Description Purpose Applicable to Supersedes This document establishes a Management
What does science mean to you? photo contest - Terms and Conditions
What does science mean to you? photo contest - Terms and Conditions 1. OBJECTIVES The What does science mean to you? photo contest offers teams of young people from the European Union an opportunity to
Mediation Services, Throughout the UK Guide to Mediation
mediation Mediation Services, Throughout the UK Guide to Mediation let sstarthere Why Mediate? Pg 3 The Mediation Day Pg 4 Preparing for the Mediation Pg 5 Quality Assured Pg 6 Flexible Fee Policy Pg 7
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while
POLICY ON USE OF INTERNET AND EMAIL
POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic
Infasme Support. Incident Management Process. [Version 1.0]
Infasme Support Incident Management Process [Version 1.0] Table of Contents About this document... 1 Who should use this document?... 1 Summary of changes... 1 Chapter 1. Incident Process... 3 1.1. Primary
Electronic business conditions of use
Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users
WORLDSKILLS SINGAPORE 2014 QUALIFYING ROUND TECHNICAL DESCRIPTION
WORLDSKILLS SINGAPORE 2014 QUALIFYING ROUND TECHNICAL DESCRIPTION INFORMATION TECHNOLOGY SOFTWARE SOLUTIONS FOR BUSINESS (Information for Competitors) Name and Description of Skill Category 1 The name
Request for Information
Request for Information Purpose This document provides information for vendors to decide whether they re willing to participate in a more detailed selection process. Issuing this request in no way obligates
INTRODUCTION TO INDUSTRIAL PSYCHOLOGY / ORGANIZATIONAL BEHAVIOR
INTRODUCTION TO INDUSTRIAL PSYCHOLOGY / ORGANIZATIONAL BEHAVIOR The Field of I/O Psychology The Field of Industrial Psychology / Organizational Behavior DEFINITION: Industrial / Organizational psychology
Testing Websites with Users
3 Testing Websites with Users 3 TESTING WEBSITES WITH USERS Better Practice Checklist Practical guides for effective use of new technologies in Government www.agimo.gov.au/checklists version 3, 2004 Introduction
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
Maryland Technology Literacy Standards for Students
Standard 1.0 Technology Systems: Develop foundations in the understanding and uses of technology systems Pre-kindergarten Kindergarten Grade 1 Grade 2 Grade 3 A. Systems A. Systems A. Systems A. Systems
VoIPCortex IP PBX features and benefits
VoIPCortex IP PBX features and benefits Using our core VoIPCortex platform we have developed a powerful range of IP PBX solutions to suit a broad set of customer requirements. A comprehensive feature set,
Code of Practice. Civil Investigation of Fraud. Notice COP 9 MAN
Code of Practice Civil Investigation of Fraud Notice COP 9 MAN July 2009 (updated to 18 July 2011) 1 Introduction Contents Civil Investigation of Fraud Civil investigation of fraud statement Outline Confidentiality
DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY
DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY VERSION 1.0 ISSUED JULY 2015 CONTENTS Page CONTENTS VERSION CONTROL FOREWORD i ii iii POLICY 1 Scope 1 Aim and Objectives 1 Methods and Standards 1
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
ELECTRONIC DOCUMENT & RECORDS MANAGEMENT
ELECTRONIC DOCUMENT & RECORDS MANAGEMENT Administration Policy Shared Services 2012 Outline Background What is? Implementation Strategies Implementation Approach Change Management Approach Expected infrastructure
ITIL A guide to service asset and configuration management
ITIL A guide to service asset and configuration management The goal of service asset and configuration management The goals of configuration management are to: Support many of the ITIL processes by providing
GOOD CAREER GUIDANCE SIR JOHN HOLMAN
GOOD CAREER GUIDANCE SIR JOHN HOLMAN THE BENCHMARKS IF YOUNG PEOPLE KNOW MORE ABOUT THE RANGE OF CAREERS OPEN TO PEOPLE WITH THE RIGHT QUALIFICATIONS, THEY WILL HAVE A CLEARER IDEA OF THE ROUTES TO BETTER
University of Huddersfield Repository
University of Huddersfield Repository Hajjaji, Mufeed, Denton, Paul and Jackson, Steve The effectiveness of using project management tools and techniques for delivering projects Original Citation Hajjaji,
Using ipads in Undergraduate Mathematics
Using ipads in Undergraduate Mathematics Eric J. Thornburg This paper was completed and submitted in partial fulfillment of the Master Teacher Program, a 2-year faculty professional development program
EC500 User Guide. Michigan State University Avaya Campus PBX
Michigan State University Avaya Campus PBX EC 500 (Extension to Cellular) is an available feature for Avaya telephone users. EC500 allows you to integrate your cell phone with your Avaya Campus PBX number.
Websites & Social Media. in the Professional Environment. A practical guide to navigating the world of social media
Websites & Social Media in the Professional Environment @ A practical guide to navigating the world of social media istockphoto.com/andrearoad Introduction Your Online Presence An online presence is essential
Virtual Meetings to Enhance Communication, Collaboration and Savings
Virtual Meetings to Enhance Communication, Collaboration and Savings Executive Summary In an economy that is set to experience a steep rise in travel, fuel costs and a newly-introduced carbon tax, organisations
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
Protective Marking for UK Government
Protective Marking for UK Government WHITE PAPER Contents Introduction 3 Regulatory Requirements 3 Government Protective Marking System (GPMS) 3 The Value Beyond Regulatory Requirements 4 Leveraging Other
Everything you should know about smart meters
Everything you should know about smart meters And getting them to work for you Our goal is to help you to understand and get the most out of your smart meter 2 Contents 4 Smart meters and you 5 Your electricity
Hosted Exchange Sales Toolkit. Common objections FAQs
Hosted Exchange Sales Toolkit Common objections FAQs Hosted Exchange Toolkit Common Objections FAQs Target Audience Usage Marketing Managers Used to create online FAQs and knowledge base content for self-service
A Guide to Intellectual Property Management & Commercialisation
A Guide to Intellectual Property Management & Commercialisation The following is a brief overview Intellectual Property management & commercialisation focussing on patents and copyright, the most common
The NREN s core activities are in providing network and associated services to its user community that usually comprises:
3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of
The Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs E-Learning and support tools for Information and Computer Sciences Conference Item How to cite:
Disaster Recovery. Tips for business survival. A Guide for businesses looking for disaster recovery November 2005
Disaster Recovery Tips for business survival A Guide for businesses looking for disaster recovery November 2005 Page 1 of 9 Introduction The aim of this paper is to highlight the importance of having a
