Full Paper View Go Back

Evaluating the Permissions of Monitoring Mobile Applications for Remote Employees: Analysing the Impact on Employer Trust and Employee Privacy Concerns

Polra Victor Falade1 , Patience Ocheche Momoh2

Section:Research Paper, Product Type: Journal-Paper
Vol.12 , Issue.1 , pp.42-52, Feb-2024


Online published on Feb 28, 2024


Copyright © Polra Victor Falade, Patience Ocheche Momoh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Polra Victor Falade, Patience Ocheche Momoh, “Evaluating the Permissions of Monitoring Mobile Applications for Remote Employees: Analysing the Impact on Employer Trust and Employee Privacy Concerns,” International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.1, pp.42-52, 2024.

MLA Style Citation: Polra Victor Falade, Patience Ocheche Momoh "Evaluating the Permissions of Monitoring Mobile Applications for Remote Employees: Analysing the Impact on Employer Trust and Employee Privacy Concerns." International Journal of Scientific Research in Computer Science and Engineering 12.1 (2024): 42-52.

APA Style Citation: Polra Victor Falade, Patience Ocheche Momoh, (2024). Evaluating the Permissions of Monitoring Mobile Applications for Remote Employees: Analysing the Impact on Employer Trust and Employee Privacy Concerns. International Journal of Scientific Research in Computer Science and Engineering, 12(1), 42-52.

BibTex Style Citation:
@article{Falade_2024,
author = {Polra Victor Falade, Patience Ocheche Momoh},
title = {Evaluating the Permissions of Monitoring Mobile Applications for Remote Employees: Analysing the Impact on Employer Trust and Employee Privacy Concerns},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2024},
volume = {12},
Issue = {1},
month = {2},
year = {2024},
issn = {2347-2693},
pages = {42-52},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3430},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3430
TI - Evaluating the Permissions of Monitoring Mobile Applications for Remote Employees: Analysing the Impact on Employer Trust and Employee Privacy Concerns
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Polra Victor Falade, Patience Ocheche Momoh
PY - 2024
DA - 2024/02/28
PB - IJCSE, Indore, INDIA
SP - 42-52
IS - 1
VL - 12
SN - 2347-2693
ER -

200 Views    191 Downloads    28 Downloads
  
  

Abstract :
Amid the worldwide COVID-19 pandemic, there has been an extraordinary surge in remote work, bringing attention to its lasting effects on the modern workforce. This significant change has led organizations to adopt remote work as a permanent element, requiring them to develop flexible and robust work approaches. Amidst the exponential growth of remote work, the use of monitoring apps to oversee employee tasks has become more common. However, the widespread adoption of these apps has raised significant concerns about the privacy of data and the rights of employees. This study focuses on examining the privacy problems associated with monitoring mobile apps designed for remote workers. We looked at 12 such apps. To evaluate the privacy concerns associated with mobile applications used for monitoring remote employees, we employed a vulnerability assessment tool. Surprisingly, all 12 apps lacked privacy policies, and also all had permissions that could potentially violate employees` privacy by revealing sensitive information about them. This research provides important insights into the areas of data privacy, employee monitoring, and remote work practices. It offers guidance to app developers and organizations on how to strike a balance between monitoring productivity and protecting employee privacy rights. By addressing the issues raised in this study, stakeholders can create a safe and supportive environment for remote workers while still respecting their privacy and building trust.

Key-Words / Index Term :
Employee monitoring, mobile applications, remote work, privacy issues, trust

References :
[1] P. V. Falade, “Analysis of 419 Scams?: The Trends and New Variants in Emerging Types,” vol. 11, no. 5, pp. 60–74, 2023.
[2] S. S. -, “Design and Implementation of Chatbot using Python,” Int. J. Multidiscip. Res., vol. 5, no. 6, pp. 13–18, 2023, doi: 10.36948/ijfmr.2023.v05i06.9993.
[3] R. C. Jalagat and A. M. Jalagat, “RATIONALIZING REMOTE WORKING CONCEPT AND ITS IMPLICATIONS,” no. April, 2019.
[4] S. Trivedi and N. Patel, “Virtual Employee Monitoring: A Review on Tools, Opportunities, Challenges, and Decision Factors,” Empir. Quests Manag. Essences, vol. 1, no. 1, pp. 86–99, 2021, [Online].
[5] S. E. Chang, A. Liu, and S. Lin, “Exploring privacy and trust for employee monitoring,” Ind. Manag. Data Syst., vol. 115, pp. 88–106, Feb. 2015, doi: 10.1108/IMDS-07-2014-0197.
[6] D. J. Borkovich and R. J. Skovira, “Working From Home?: Cybersecurity in the Age of Covid-19,” no. September, 2020, doi: 10.48009/4.
[7] O. Karpenko, A. Kuczabski, and V. Havryliak, “Mechanisms for providing cybersecurity during the COVID-19 pandemic?: Perspectives for Ukraine,” March 2021.
[8] S. Vicaria, “The Rise Of Remote Work And How To Handle A Remote-First Team,” 2023.
[9] G. Crossland, A. Ertan, and N. M. Anima, “Remote Working and Cyber Security,” no. January, pp. 1–27, 2021.
[10] A. M. Jalagat, “Rationalizing Remote Working Concept and,” Glob. J. Adv. Res., no. 3, pp. 95–100, 2019.
[11] J. R. C. Nurse, N. Williams, E. Collins, N. Panteli, J. Blythe, and B. Koppelman, “Remote Working Pre- and Post-COVID-19?: An Analysis of New Threats and Risks to Security and Privacy,” pp.1–8.
[12] L. Atst?ja, D. R?t?tis, S. Deruma, and E. Aksjo?enko, “Cyber Security Risks And Challenges In Remote Work Under The Covid-19 Pandemic,” no. January 2022, pp. 12–22, 2021, doi: 10.15405/epsbs.2021.12.04.2.
[13] K. Okereafor, Cybersecurity in the COVID-19 Pandemic, no. March. 2021. doi: 10.1201/9781003104124.
[14] M. Burrows, D. Hadzic, KPMG Internacional, and K. Stoltz, “Current trends in remote working,” KPMG Glob., pp. 2–17, 2022, [Online].
[15] I. Aldasoro, J. Frost, and L. Gambacorta, “Covid-19 and cyber risk in the Financial sector,” no. 37, 2021.
[16] B. Obada-obieh, Y. Huang, K. Beznosov, and K. Beznosov, “Challenges and Threats of Mass Telecommuting?: A Qualitative Study of Workers This paper is included in the Proceedings of the Seventeenth Symposium on Usable Privacy and Security .,” 2021.
[17] B. J. Arnold, C. Kou, and C. Oates, “Cyber Security and Privacy risks in a remote work environment,” 2020.
[18] M. K. Pratt, “Remote work cybersecurity: 12 risks and how to prevent them,” 2022.
[19] K. J. Rotenberg, “Trust in the Workplace,” Psychol. Interpers. Trust, no. June, pp. 92–101, 2019, doi: 10.4324/9781351035743-9.
[20] S. K. Parker, C. Knight, and A. Keller, “Remote Managers Are Having Trust Issues,” 2020.
[21] D. Zielinski, “Monitoring Remote Workers,” 2020.
[22] A. Dimitropoulou, “Remote Work and its effects on Work-Life Balance,” 2023.
[23] P. V Falade and G. B. Ogundele, “Vulnerability Analysis of Digital Banks ’ Mobile Applications,” vol. 1, no. 1, pp. 44–55, 2022.
[24] C. Hawes, “What is mobile app monitoring? And the importance of mobile analytics,” 2022.
[25] E. Czerwonka, “How do companies track employees?” 2023.
[26] Immuniweb, “Immuniweb AI for Application Security,” 2022.
[27] ImmuniWeb, “ImmuniWeb AI for Application Security,” 2023.
[28] C. Kumar, “12 Mobile App Scanner to Find Security Vulnerabilities,” 2022.
[29] SoftwareTestingHelp, “10 Best Mobile APP Security Testing Tools In 2022,” 2022.
[30] Iubenda, “What is a Privacy Policy?,” 2023.
[31] G. McDowell, “30 App Permissions To Avoid On Android,” 2020.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation