Sobalaje et al
Greener Journal of Social Sciences Vol. 5 (2), pp. 042-050, April 2015
ISSN: 2276-7800 © 2015 GJSS
Manuscript Number: 291114398
Monitoring Employees’ Use of the Internet in Ladoke Akintola University of Technology Ogbomoso, Oyo State, Nigeria
1Sobalaje Adewale Joel, *2Adigun Ganiyu Ojo and
3Arinola Adesoji Adeola
1,2,3 Olusegun Oke Library, Ladoke Akintola University of Technology, P.M.B. 4000, Ogbomoso, Oyo State, Nigeria.
E-mails: 1walesoba@ yahoo. com, 3sojirinsola@ yahoo. com
*Corresponding Author’s E-mail: adiganfoly@ yahoo. com
The study investigated how employees’ use of Internet is monitored in Ladoke Akintola University of Technology, Ogbomoso, Oyo state, Nigeria. The study focused on internet access and use, Internet usage and monitoring, policy on personal use of internet in the institution and implementation of policies. It also examined how Internet is restricted and common Internet misuse problems. A structured questionnaire was used to collect data from 350 respondents in the institution out of which 290 (82.9%) responded and were used for the analysis. Descriptive and Inferential statistics was used to analyze the data using percentage table and simple regression analysis to test the association between the variables. Findings showed that more than half of the respondents have access to and use Internet for their working activities. It was also revealed that most of employees use Local Area Network and Direct subscriber license / Wide area network as their connection type. The study established that higher percentage of the respondents indicated that monitoring of the use of Internet is not practiced. More so small number of the respondents indicated that the institution have written policy on Internet use. It further revealed that just 3.2% of employee has been dismissed on misuse of institutional web sites. Thus implementation of policy, awareness and compliance with policy is yet to find the right foot in the institution, the study therefore recommended formulation of relevant Internet regulation policy as well as publicizing the policy.
Keywords: Internet usage, Internet usage monitoring, Employees, LAUTECH.
Adeya B. & Oyeyinka, C.N. (2002). The Internet in African Universities: Case Study of Kenya and Nigeria. NU/INTECH Discussion Paper.
Adewoye, J, Ayo, C.K, Oni, A.A and Adebiyi, A.A. (2011). The impact of IT investment delivery of Ladoke Akintola University. Journal of Emerging Trends in Educational Research and Policy Studies 2(11): pp.60-66.
Aina, L.O. (2004). Library and information science text for Africa. Ibadan, Nigeria: Third World Information Services Limited, p. 324
Alampay, E.A, and Hechanova, R.M. (2010) Monitoring Employee Use of the Internet in Philippine Organizations: The Electronic Journal on Information Systems in Developing Countries, 40(5), 1-20.
American Management Association (2008). 2007 Electronic Monitoring & Surveillance Survey Retrieved April 28, 2014, from: http://press.amanet.org/press-releases/177/2007-electronicmonitoring-surveillance-survey.
American Management Association (2005, 2001), AMA Research: Workplace Monitoring and Surveillance, 1999, 2000, 2001 and 2005. Accessed on August 4, 2014 from: www.amanet.org/research/archive_2001_1999.htm.
American Management Association (2003). Survey on Workplace E-Mail Reveals Disasters in the Making, May 28, 2003; Accessed on August 4, 2014 from: www.amanet.org/press/amanews/Email_Survey2003.htm.
Awoleye, O.M., Siyanbola, W.O., & Oladipo, F.O. (2008) Adoption Assessment of Internet Usage amongst Undergraduates in Nigeria Universities- A Case Study Approach. Journal of Technology Management and Innovation (JOTMI Research Group) Santiago Chile. 3(001), 84-89.
Bhatt, G. D. (2000). Organizing knowledge in the knowledge development cycle. Journal of Knowledge Management, 4, 15-26.
Bezek, P.J., & Britton, S.M. (2001). Employer monitoring of employee Internet use and e-mail: MEALEY'S Cyber Tech Litigation Report, 2, Retrieved April 28, 2014, from:
Chalykoff, J. & Kochan, T. (1989) Computer-aided monitoring: Its influence on employee job satisfaction and turnover. Personnel Psychology 42, 807–834.
Court, L., & Warmington, C. (2004). The workplace privacy myth: why electronic monitoring is here to stay. Employment and Labor Law, 1(1), 1-20.
Crimmins, J. Even federal judges come under surveillance when online. Chicago Daily Law Bulletin 147, 159 (Aug. 14, 2001).
Deisz, J. (2005). Internet filtering and how it affects security, efficiency and thriving in Norwegian Companies. Msc Thesis published with Royal Institute of Technology (KTH), Stockholm. Retrieved 13th November, 2012 from: http://www.nislab.hig.no
Flynn, N. (2009) The e-Policy Handbook (2nd Ed) - Rules and Best Practices to Safely Manage Your Company’s Email, Blogs, Social Networking and Other Electronic Communication Tools, AMACOM books.
Frayer, C. (2002). Employee privacy and internet monitoring: balancing workers' rights and dignity with legitimate management interests. Business Lawyer, 57(2), 857 - 878.
Gahtan, A. (2002) Monitoring Employee Communications. The Cyber law Encyclopedia. Retrieved January 06, 2012 from: http://www.gahtan.com/alan/articles/monitor.htm
Gupta, J. (2004) Improving Workers’ Productivity and Reducing Internet Abuse, The Journal of Computer Information Systems, 44, 2, 74-78.
Guthrie, R. & Gray, P. (1996). Junk Computing: Is it bad for an organization? Information System Management, 23–28.
Hart, K. (2000). THE MEMORY BANK: Money in an Unequal World. Cambridge, London:Profile Books Ltd.
Hechanova, M.R. & Estuar, M.R (2010). Are You Living a Computer-Connected Life? in Hechanova, M.R., Franco, E.P. and Reyes, R. (Eds). Pinoy@Work. Manila, Philippines: Ateneo de Manila University Loyola Schools Office of Research and Publications.
Horrigan, J. and Lee, R. (2006) The Internet’s Growing Role in Life’s Major Moments. Accessed on Dec. 10, 2012 from: http://www.pewInternet.org/pdfs/PIP_Major%20Moments_2006.pdf.
Leiner, B.M.; Kahn, R. E.; Postel, J.; Clark, D.D.; …Roberts, L.G. (2009). A Brief history of the Internet. ACM SIGCOMM Computer Communication Review, 39(5), 4-7.
Madueme, I. S. (2010) Evaluation of the Impact of Information Communication Technology on Banking Efficiency Using the Transcendental Logarithmic Production function and Camel Rating. International Journal of Engineering Science and Technology, 2(1), 1-6.
Marshall, P. (2001). Are tougher laws needed to protect citizens? Privacy under Attack, 11(19), 1-30.
McEvoy, S. (2002). E-mail and Internet Monitoring and the Workplace: Do Employees have a Right to Privacy? , Communications and the Law, 24(2), 69-84.
Neilson Net Rankings (2006). U.S. Online Population Internet Use. Accessed on August 6, 2014 from: www.nielsen-netratings.com/pr/pr_021218.pdf.
Nord, G.D.; McCubbins, T.F. & Nord, J.H. (2006). E-Monitoring in the workplace: privacy, legislation, and surveillance software. Communications of the ACM, 49(8), 73-77.
Peters, T. A. (1999). Computerized Monitoring and Online Privacy. Jefferson, North Carolina: McFarland & Company.
Pew Internet Survey (2002). Pew Internet & American Life, getting serious online: as Americans gain experience they use the web more at work, write e-mails with more significant content, perform more online transactions, and pursue more serious activities. Accessed on August 6, 2014 from: www.pewinternet.org/reports/toc.asp?Report=55.
Ojedokun, A.A (2001). Internet Access and Usage by Students of the University of Botswana: African Journal of Library, Archive and Information Science, 11(2), 97-109.
Omolase, C. O., Ihemedu, C. O., Ogunleye, T. O., & Omolase, B. O. (2010). Use of Internet for Health Information amongst Medical Practitioners in a Nigerian Community. TAF Preventive Medicine Bulletin, 9(2), 93-98.
Simmers, C. A. (2002). Aligning Internet usage with business priorities: Regulating Internet activities so that targeted outcomes remain within acceptable limits. Communications of the ACM, 45(1), 71-74.
United Nations Publication (2007) Internet Use For Business Development: An Introductory Set Of Training Modules For Policymakers. Bangkok 2007
Urdan, T., and C. Weggen (2000) “Corporate e-learning: exploring a new frontier”. http:www.elearning//publicaties/marktonderzock/New_Frontier.pdf. Accessed on Dec. 10, 2012.
Ureigho, R.J, Oroke, G.U, and Ekruyota, G.O. (2006). The Impact of Internet Usage: A Case Study of Delta State (Nigeria) Tertiary Institutions. Journal of Scientific Research and Essay, 1(2), 054-056.
Yerby, J. (2013). Legal and ethical issues of employee monitoring. Online Journal of Applied Knowledge Management, 1(2), 44-55.
Yulihasri, Ramayah T., Norzalila J., & Amlus I., (2006) Use and Misuse of the Internet in the Malaysian Workplace: Preliminary Findings from an Exploratory Study IAMOT, 2006.
Zuboff, S. (1988). In the Age of the Smart Machine. New York: Basic Books.
Call for Papers/Books/Thesis
Call for Scholarly Articles
Authors from around the world are invited to send scholary articles that suits the scope of this journal. The journal is currently open to submissions and will process articles promptly and publish ready articles daily in each current issue.
The journal is centered on quality and goes about its processes in a very timely fashion. Seasoned editors/reviewers will be consulted to review each article(s), profer quality evaluations and polish the articles with expertise before publication.
Simply send your article(s) as an e-mail attachment to email@example.com or firstname.lastname@example.org.