Skip to main content

Full text of "West Georgia College Studies in the Social Sciences"

See other formats


O  t  UoLit  6    I 


y\ 


Studies  in  the  Social  Sciences 
State  University  of  West  Georgia 


Vol  XXXVII.  No  1 
January  2002 


Digitized  by  the  Internet  Archive 

in  2011  with  funding  from 

LYRASIS  Members  and  Sloan  Foundation 


http://www.archive.org/details/westgeorgiacolle37unse 


Studies  in  the  Social  Sciences 


'Technology  and  the  Social  Sciences' 


This  edition  is  dedicated  to  the  memory  of  the  victims  and  to  honor  the  heroes 

responding  to  the  terrorist  assaults  in  the  Washington  area,  New  York  City  and 

Pennsylvania;  September  1 1 ,  200 1 


The  State  University  of  West  Georgia 
College  of  Arts  and  Sciences 

iCarrollton,  Georgia 
770  836-6500 
www.westga.edu 


Volume  XXXVII,  Number  1 

January  2002 

ISBN:  1-883199-14-X 


All  rights  reserved.  Permission  to  reproduce  these  works  may  be  obtained  by  writing  to  the 
editor.  A  double  blind-review  process  was  carried  out  for  articles  contained  herein. 


Studies  in  the  Social  Sciences 

Editor 

Robert  M.  Sanders 
State  University  of  West  Georgia 


Associate  Editors 

Paul  E.  Masters  Stanley  M.  Caress 

State  University  of  West  Georgia  State  University  of  West  Georgia 


Editorial  Board 

G.  Richard  Larkin  J.  David  Haskin 

State  University  of  West  Georgia  Georgia  State  University 

Barbara  L.  Neuby  Ronald  Hunter 

Kennesaw  State  University  State  University  of  West  Georgia 

Cal  Clark  Florence  S.  Ferguson 

Auburn  University  State  University  of  West  Georgia 

Janet  M.  Clark 

State  University  of  West  Georgia 


Editorial  Assistants 

James  D.  Rodgers 
State  University  of  West  Georgia 

NSugumaran  Narayanan 
State  University  of  West  Georgia 

Sudeep  Perumbakkam 

State  University  of  West  Georgia 


Contents 

Page 
Acknowledgments/Contributors vii 

Prologue..  Technology  in  the  Social  Sciences ix 

Barbara  L.  Neuby 

Articles: 

Society— 
Advertising  Communications  Technology  on  Television: 
Selling  a  Paradigm-  A  Symptom  of  Our  Culture 1 

Jenny  Kerr 

E-Invasion  of  Privacy 1 1 

Cole  D.  Taratoot 

Geographic  Information  Technologies  and  Their 

Potentially  Erosive  Effects  on  Personal  Privacy 19 

Marc  P.  Armstrong 

To  Promote  the  General  Welfare-  The  Ethical 

Imperative  of  Closing  the  Digital  Divide 29 

Valerie  L.  Patterson 

Government— 
Political  Activity,  Administrative  Controls  and 
Communications  Technology:  Observations  from 
a  State  Bureaucracy 39 

Robert  M.  Sanders  and  Alexander  Y.  Aronson 

Innovation,  Technology  and  Municipal  Governments 47 

Dahlia  Bradshaw  Lynn 

Education— 

Utilizing  Technology  to  Revitalize  and  Modernize 

Pi  Gamma  Mu  65 

Barry  D.  Friedman 


v 


Acknowledgments 

The  Editor,  contributors  and  the  Department  of  Political  Science  would  like 
to  thank  the  Department  Chair  and  the  advisor  to  the  Political  Science  Club 
of  the  State  University  of  West  Georgia  for  their  support  of  this  volume. 

About  the  contributors... 

Barbara  L.  Neuby  is  Associate  Professor  of  Political  Science  at  Kennesaw  State 
University  where  she  teaches  graduate  and  undergraduate  courses  in  public 
administration  and  policy  sciences.  She  brings  20  years  of  engineering  and 
design  experience  to  her  classes  and  formerly  taught  at  the  State  University 
of  West  Georgia  from  1995  until  2001.  Dr.  Neuby  was  awarded  the  Board 
of  Regents,  Distinguished  Teaching  Award  in  1998  and  Teacher  of  the  Year 
for  the  Arts  &  Sciences  in  1999.  She  is  currently  researching  municipal 
preparedness  for  biological  emergencies. 

Jenny  Kerr  will  complete  her  Master's  Degree  in  Psychology  at  the  State 
University  of  West  Georgia  in  December  of  200 1 .  With  diverse  interests  in 
social  psychology,  GLBT  studies,  holistic  health,  integrative  arts  therapies, 
multicultural  issues,  and  theoretical  cultural  analysis,  Jenny  intends  to  help 
facilitate  both  personal  growth  and  social  change  in  the  future.  Ms.  Kerr 
currently  resides  in  Carrollton,  GA  with  her  legally  related  life-partner,  John, 
six  cats,  and  a  mouse  named  Willy. 

Cole  D.  Taratoot  is  a  research  assistant  in  the  doctoral  program  at  Virginia 
Technical  Institute  and  State  University.  He  received  both  his  undergraduate 
degree  in  political  science  and  MPA  degree  from  the  State  University  of 
West  Georgia  where  he  was  the  founder  and  president  of  the  political 
science  club.  His  research  with  the  Small  Community  Outreach  Project  on 
Environmental  Issues  (SCOPe)  was  published  by  the  EPA  in  September  of 
2000.  Other  work  was  presented  at  the  Georgia  ASPA  academic  conference 
in  March  of  2001. 

Marc  P.  Armstrong  is  Professor  and  Chair  of  the  Department  of  Geography 
at  The  University  of  Iowa.  He  also  holds  an  appointment  in  the  Graduate 
Program  in  the  Applied  Mathematical  and  Computational  Sciences  and  is 
a  member  of  the  Center  for  Global  and  Regional  Environmental  Research. 


Armstrongs  Ph.D.  is  from  the  University  of  Illinois  at  Urbana-Champaign. 
He  has  served  as  North  American  Editor  of  the  International  Journal  of 
Geographical  Information  Science  and  as  the  Associate  Editor  of  Cartography 
and  Geographic  Information  Systems. 

Acknowledgements 

I  wish  to  thank  Claire  E.  Pavlik  for  comments  on  an  earlier  draft  of  my 
paper  and  Ronghai  Sa  for  assistance  with  the  GIS  analyses.  Support 
provided  by  the  Obermann  Center  for  Advanced  Studies  is  also  gratefully 
acknowledged. 

Valerie  Patterson  is  on  the  faculty  of  the  School  of  Policy  and  Management  at 
Florida  International  University,  where  she  teaches  courses  in  administrative 
and  governmental  ethics  and  values,  and  courses  dealing  with  contemporary 
race  and  gender  issues.  She  holds  a  Ph.D.  in  public  administration. 
Additionally,  she  teaches  human  resource  policy  and  management  at  the 
undergraduate  and  graduate  levels.  She  currently  serves  as  Associate  Director 
of  Graduate  Studies  for  the  School  of  Policy  and  Management.  Her  research 
and  publications  address  the  impact  of  values  on  administrative  ethics,  truth, 
and  honesty,  as  well  as  human  resource  policy  issues. 

Robert  M.  Sanders  is  an  Associate  Professor  of  Government  and  Public 
Administration  in  the  Department  of  Political  Science  at  the  State  University 
of  West  Georgia.  His  fields  of  specialization  include  public  policy  and 
organization  theory,  with  consulting  activity,  presentations  and  published 
research  on  topics  pertaining  to  the  federal  bureaucracy,  immigration  policy, 
interest  group  activity  and  social  services  on  the  state  level.  He  received  his 
Ph.D.  in  Public  Administration  at  Florida  International  University. 

Barry  D.  Friedman  is  professor  of  political  science  and  coordinator  of  the 
M.P.A.  program  at  North  Georgia  College  &  State  University  (NGCSU) 
in  Dahlonega.  He  received  his  M.B.A.,  M.P.A.,  and  Ph.D.  in  political 
science  from  the  University  of  Connecticut.  He  is  the  author  of  Regulation 
in  the  Reagan-Bush  Era:  The  Eruption  of  Presidential  Influence  (University 
of  Pittsburgh  Press,  1995).  In  addition  to  serving  as  secretary-treasurer  of 
NGCSU's  chapter  of  the  Pi  Gamma  Mu  social  science  honor  society,  he  is 
also  the  honor  society's  vice  chancellor  of  the  Atlantic  Region  and  governor 
for  Georgia.  He  is  the  faculty  advisor  of  NGCSU's  chapter  of  the  Pi  Sigma 
Alpha  political  science  honor  society  and  the  founding  executive  director  of 
NGCSU's  Council  of  Honor  Societies. 


Prologue 

Technology  in  the  Social  Sciences 

Ah,  Technology,  that  cure-all,  that  revolutionary  tool  to  make  the  uneducated, 
unmotivated  masses  learn  more  quickly,  more  completely,  and  better.  Our 
lives  are  surrounded  by  technology.  There  is  scarcely  an  area  of  life  that 
is  not  touched  or  totally  controlled  by  technology.  From  computers  to 
video  streams  to  palm  pilots  and  cell  phones,  the  fabric  of  most  of  our 
lives  is  technology. 

But  there  is  no  "theory"  of  technology.  There  is  no  guide  to  its  proper 
use  or  set  of  rules  to  avoid  its  misuse-  only  abundant  commentary  on  its 
myriad  adaptations,  successes  or  failures.  In  the  social  sciences,  technology 
has  provided  a  wealth  of  benefits,  both  realized  and  potential.  It  has  presented 
numerous  challenges  to  social  science  faculty,  administrators,  students  and 
policy  analysts.  The  presence  of  technology  has  created  a  technocratic  elite 
and  resultant  social  stratification. 

The  benefits  of  technology  are  real  and  potential.  Whether  from  computers, 
video  streams  or  other  scientific  technology,  an  exponential  increase  in 
information  has  promoted  more  and  better  social  research,  analysis,  teaching 
and  learning.  From  equipment  advances  in  natural  sciences,  the  DNA 
Sequencer,  for  example,  come  opportunities  to  analyze  the  social  consequences 
of  the  products  of  discovery  of  the  natural  world.  Technology  has  also  created 
problems  left  with  which  social  scientists  must  deal  (gambling)  and  sometimes 
technology  fixes  problems  social  scientists  have  not  or  could  not  resolve 
(pharmaceuticals).  So  rapidly  are  discoveries  made,  that  social  scientists  barely 
make  sense  of  their  consequences  before  new  events  occur. 

Of  course,  huge  advances  in  social  research  have  also  been  made.  User- 
friendly  computer  programs  open  data  sets  to  hypotheses  once  testable 
only  via  obfuscating  higher  mathematics  generally  not  well  practiced  by 
social  scientists  without  pain.  Hypotheses  can  now  be  tested  on  a  hand 
held  calculator. 

Public  offices  in  which  social  research  is  carried  into  policy  are  now 
technology  driven.  Through  GIS  information  systems,  computer  modeling 
or  artificial  intelligence,  policy  analysis  and  program  evaluation  are  vaulted  to 
ever-higher  degrees  of  sophistication.  The  way  in  which  public  officials  carry 
out  their  duties  has  also  changed  via  technology.  Paper,  the  stock  in  trade  of 
the  administrator,  has  given  way  to  magnetism,  plastic  and  magical  things 


called  transistors.  The  flow  of  work  often  involves  no  paper  at  all.  The  very 
workforce  itself  has  also  responded.  Almost  everyone  in  public  offices  has 
knowledge  of  technology,  primarily  computers,  but  also  a  wide  variety  of 
equipment  such  as  digital  cameras,  environmental  testing  and  treatment 
supplies  and  procedures.  Last,  but  certainly  not  least,  is.  the  revolution 
in  communications.  Though  privacy  is  a  concern,  the  flow  of  discussion 
has  expanded  by  leaps  and  bounds  both  formally  and  informally.  Needless 
to  say,  technological  change  in  the  social  sciences  has  created  a  whole 
new  branch  of  law. 

The  tech  revolution  has  created  many  challenges,  for  social  science  faculty, 
administrators  and  students.  There  seems  to  be  an  almost  supernatural  or 
mystical  belief  that  the  availability  of  technology  produces  better,  more 
motivated  students  and  that  every  faculty  member  who  uses  technology  in 
instruction  is  somehow  a  better  teacher.  Not  necessarily.  Whether  through 
the  use  of  web-based  classes,  videos  in  the  classroom,  internet  assignments  or 
televised  course  distribution,  all  that  technology  guarantees  is  the  opportunity 
to  package  old  wine  in  new  bottles.  Or  does  technology  produce  new 
instructional  wine?  There  is  that  huge  database  of  information.  Technology 
challenges  the  status  quo.  A  gauntlet  to  faculty  to  use  it  properly,  and  to  keep 
up  with  its  advancements.  Technology  has  allowed  faculty  to  deliver  courses 
far  away  to  students  who  might  otherwise  get  nothing.  Some  proponents 
say  to  avoid  technology  in  instruction  is  to  condemn  oneself  to  mediocrity. 
Research  is  underway  to  see  whether  this  is  so.  Technology  will  help  us  gather 
evidence.  Let  us  use  the  tool  to  validate  its  mission. 

Students  are  faced  with  the  same  challenge.  Word  processing  has 
revolutionized  the  "term  paper."  Or  has  it?  Note  the  wealth  of  papers 
with  misspelled  words,  poor  grammar  and  punctuation  and  no  or  poorly 
documented  resources.  But  there  is  that  huge  database  of  information.  Does 
that  motivate  them  to  critically  think  or  analyze?  Does  technology  advance 
their  ability  to  make  correct  judgments?  Does  it  make  them  more  mature?  The 
jury  is  not  in  quite  yet.  High  schools  students  and  faculty  are  also  similarly 
challenged.  Should  a  high  school  geography  class  have  a  GIS  system?  A  wide 
variety  of  informational  technologies  are  available;  and,  students  too  feel  the 
pressure  to  conform  to  the  techno  norm  of  having  the  best. 

Administrators  feel  the  budgetary  pinch  universally  across  all  disciplines. 
Every  clamor  for  more  technology  forces  examination  of  a  request  not  made 
years  ago.  It  is  perhaps  more  difficult  for  social  sciences  to  justify  these 
requests,  as  opposed  to  natural  sciences  or  business  who,  for  so  long  have  built 
their  educational  paradigms  on  the  acquisition  of  scientifically  accumulated 


"data."  However,  every  campus  now  has  an  IT  department  complete  with 
staff,  a  multi-million  dollar  inventory  and  budget.  Every  dollar  spent  here 
is  a  dollar  not  spent  on  salaries,  supplies,  facilities,  grounds  or  other  equally 
deserving  programs.  And,  of  course,  once  a  line  of  equipment  is  purchased, 
it  generally  has  to  be  upgraded.  Staff  needs  to  be  trained.  Policies  regarding 
its  uses  must  be  developed.  Technology  is  self-perpetuating.  Job  security. 
No  tenure  required. 

Technology  is  not  a  panacea.  We,  in  social  sciences,  like  other  disciplines, 
are  captured  by  its  intrigue,  wowed  by  its  performance  and  indebted  to  its 
results.  We  must  take  the  bad  with  the  good.  And,  if  we  can  only  discover  the 
good  before  it  becomes  obsolete,  and  make  wise  and  judicious  use  of  it,  we 
will  have  mastered  one  of  humankind's  greatest  gifts. 

Barbara  L.  Neuby 
Kennesaw  State  University 
September  11,  2001. 


Advertising  Communications  Technology  on 

Television:  Selling  a  Paradigm  - 

A  Symptom  of  Our  Culture 

Jenny  Kerr 

State  University  of  West  Georgia 

Abstract 

Though  much  research  has  been  done  on  the  psychological  and  social 
effects  of  advertising  on  individuals,  few  specific  cultural  analyses  have  been 
conducted  on  any  one  particular  advertisement  or  set  of  advertisements 
in  order  to  comprehend  how  ads  impact  us  in  various  ways.  This  article 
focuses  on  the  phenomenon  of  television  advertisements  promoting  the  use 
of  communication  technology,  specifically  looking  at  the  new  controversial 
advertisement  created  by  Alcatel.com  involving  the  late  Reverend  Dr.  Martin 
Luther  King,  Jr.  Using  a  style  of  cultural  analysis  proposed  by  Marjorie 
Garber  (2000)  that  views  distinct  aspects  of  culture  that  repeat  or  stand 
out  {symptoms)  as  indicative  of  large-scale  social  change  (or  a  syndrome) 
and  evidence  of  culture  in-the-making;  we  shall  see  the  beginning  of  the 
shift  toward  a  technological  mindset.  Communication  technology  (cell 
phones,  Internet,  E-mail,  etc.),  in  both  product  and  practice,  infiltrates  our 
consciousness  and  assimilates  our  being  through  advertising  as  it  becomes 
an  answer  to  all  our  needs  and  desires. 

Advertising  Communication  Technology  on  Television: 
Selling  a  Paradigm  -  A  Symptom  of  Our  Culture 

The  move  toward  a  reliance  and  increased  usage  of  technology  has  been  in 
process  since  the  turn  of  the  century,  beginning  with  the  industrial  revolution 
and  even  earlier  if  we  consider  tool  making  and  invention  technologies 
(Tierney,  1993).  Similarly,  it  is  widely  known  and  discussed  how  television 
advertisements  -just  as  this  technological  mentality-  pervades  our  culture 
and  invades  our  consciousness.  For  instance,  there  is  much  evidence  that 
advertising  adversely  affects  the  body  image  and  self-esteem  of  teen-aged  youth 
(Berger,  2000;  Gergen,  1991;  Salomon,  1979/1994  and  much  more).  Yet  the 
effects  are  tremendous  when  combining  these  two  phenomena,  apparent  in 
the  recent  bombardment  of  visual  and  auditory  stimuli  influencing  us  to  adopt 
technological  practices  and  invest  in  the  services  of  mass  communications 
and  education  technology  via  Internet,  cellular  phones,  web-sites,  etc.   If  we 

1 


Advertising  Communications  Technology  on  Television:  Selling  a  Paradigm  -  A  Symptom  of  Our  Culture 

look  more  closely  at  individual  advertisements  for  technological  products  and 
services,  we  see  companies  are  actually  selling  values  in  an  entire  paradigm, 
a  set  of  needs  linked  to  the  very  idea  of  technology,  itself,  as  we  move 
into  the  future  of  our  dependence  and  collaboration  with  technology  in 
this  new  era  of  culture. 

In  her  book,  Symptoms  of  Culture,  Marjorie  Garber  (2000)  looks  at 
specific  outstanding  cultural  phenomenon  and  attempts  to  find,  through 
various  connections,  how  it  speaks  to  culture,  in  general.  Her  analysis  views 
distinct  aspects  of  culture  that  repeat  or  stand  out  {symptoms)  as  indicative 
of  large-scale  social  change  (or  a  syndrome)  and  evidence  of  culture  in  the 
making.  Garber,  a  Harvard  professor  of  English,  considers  these  "symptoms" 
to  be  indicative  of  broader  cultural  functions  relative  to  the  manner  a 
psychological  or  physiological  symptom  would  indicate  a  greater  issue,  or 
"syndrome",  for  an  individual.  In  defining  "symptoms  of  culture",  Garber 
claims:  "They  are  cultural  practices  and  cultural  signs,  evidence  of  the  way  we 
produce  'culture'  as  something  to  be  read"  (2000,  p.  14). 

We  currently  see  an  increase  in  the  amount  of  television  commercials 
advertising  communication  and  networking  technology.  Though  this  may 
seem  to  be  simply  doing  what  other  commercials  do...  sell;  further  analysis 
reveals  differences  in  these  technological  ads  and  others  which  focus  on 
specific  household  items,  entertainment  equipment,  clothing,  cosmetics,  or 
food.  All  commercials  create  some  form  of  image  and  a  desire  to  either  be 
like  that  image  or  avoid  it,  yet  technological  advertisements  seem  to  move 
beyond  this  reflexive  response  to  a  deeper  level. 

A  Controversial  Commercial 

"...  I  say  to  you  today,  my  friends,  so  even  though  we  face  the 
difficulties  of  today  and  tomorrow,  I  still  have  a  dream.  It  is  a  dream 
deeply  rooted  in  the  American  dream"  (King,  1983/1987,  95). 

Recently,  a  commercial  aired  on  television  with  a  technologically  modified 
presentation  of  Reverend  Dr.  Martin  Luther  King  Jr.'s  famous  "I  Have  a 
Dream"  speech.  Dr.  King  is  first  depicted  giving  his  speech,  completely  alone, 
in  front  of  the  Washington  Monument.  Perhaps  he  is  rehearsing  his  speech 
or  perhaps  it  is  simply  that  something  necessary  is  missing...  Whatever 
the  intended  message,  it  is  left  up  to  the  assumption  of  the  viewers.  This  is 
quite  an  interesting  phenomenon,  since  the  "source"  (an  essential  element 
of  persuasion,  see:  Sampson,  1991,  p.  182)  or  deliverer  of  this  message  is 
deceased  and  has  been  long  before  the  company  which  he  is  "promoting" 
was  ever  created  or  conceived.    This  is  not  a  new  concept,  for  Fred  Astaire 


Jenny  Kerr 

can  still  sell  a  vacuum  cleaner,  and  a  technologically  enhanced  Nat  King 
Cole  can  sing  with  his  daughter.  However,  now,  the  purpose  of  using  these 
images  is  more  obscure. 

The  advertisement  was  for  Alcatel,  a  company  based  in  France,  attempting 
to  extend  their  global  market  to  the  U.S.  The  promoted  message  of  the 
advertisement?  "Before  you  can  inspire  -  you  must  first  connect."  and  Alcatel 
has  "The  power  to  bring  people  together...".  There  is  actually  no  mention 
of  what  Alcatel  produces.  The  emphasis  is  more  on  services,  rather  than 
products,  provided  to  society  as  a  whole.  In  other  words,  Alcatel  uses  the 
image  of  Dr.  King  to  inspire  us  and  then  suggests  that  if  we  aspire  to  such 
greatness,  we  must  elicit  the  help  of  technology,  particularly  brought  to  us 
via  the  means  of  such  companies  as  Alcatel.  The  American  Dream  is  perhaps 
to  overcome  all  challenges  and  to  be  a  successful  individual.  Yet,  Alcatel 
also  implies  the  inadequacy  of  an  individual  to  do  this  alone,  a  common 
technique  of  advertisements:  to  create  a  void  which  the  product  can  fill 
(Kitalong,  2000).  These  commercials  suggest  communication  technology  as 
the  ambiguous  answer  to  our  inadequacies  to  inspire,  to  motivate,  to  create 
social  change  and  direction  -  all  things  previously  thought  to  be  within 
the  power  of  each  and  every  American  and  perhaps  every  human  being 
on  the  planet.  So,  as  seen  in  most  all  commercials,  a  need  is  created,  but 
the  paradox  is  that  the  needs  are  now  not  filled  with  a  single  product,  but 
a  whole  mentality...  the  technological  mindset,  the  faith  in  technology 
to  do  all  things. 

The  King  ad  is  the  first  in  a  series  created  by  Alcatel,  which  includes 
monumental  speeches,  such  as  that  of  late  baseball  legend,  Lou  Gerig.  Critics 
of  Alcatels  advertisements  focus  on  the  sheer  offensiveness  of  exploiting  such 
memorable  figures  in  history;  yet,  the  intention  of  the  company  was  to  honor 
these  individuals  and  make  them  more  known  to  the  younger  generations 
(Ruskin,  2001).  Upon  further  inspection  of  their  web-site,  Alcatel.com 
is  completely  targeted  toward  buying  stock  in  the  multi-million-dollar 
company,  not  toward  inquiry  about  products  or  services,  nor  toward  offering 
any  commentaries  or  feedback  about  Alcatel  or  communicating  with  them  in 
any  such  way.  The  only  mention  of  services  on  the  web-site  lay  amidst  a  host 
of  invitations  to  check  stock  options:  "Alcatel  builds  next  generation  networks, 
delivering  integrated  end-to-end  voice  and  data  networking  solutions  to 
established  and  new  carriers,  as  well  as  enterprises  and  consumers  worldwide. 
With  130,000  employees  and  sales  of  EURO  31  billion  in  2000,  Alcatel 
operates  in  more  than  130  countries."  (All  rights  reserved.  Copyright  2001 
Compagnie  Financiere  Alcatel,  Paris,  France.)  Thus,  the  success  of  Alcatel  to 


Advertising  Communications  Technology  on  Television:  Selling  a  Paradigm  -  A  Symptom  of  Our  Culture 

sell  us  what  we  need  is  made  obvious,  though  what  we  need  is  not  so  obvious 
in  Alcatels  statement.  We  get  a  sense  of  not  only  the  grandiosity  of  technology, 
but  also  the  mystery  of  it  as  well.  In  this  we  place  our  faith. 

_"Tke  tendency  of  most  is  to  adopt  a  view  that  is  so  ambiguous 
that  it  will  include  everything  and  so  popular  that  it  will  include 
everybody"  (King  1983/1987,  24). 

Technological  services  and  products  are  estimated  to  account  for  over 
one-half  of  the  commercials  aired  on  television  this  past  year,  as  high-tech 
internet  companies  increase  advertisements  through  other  sources  (O' 
Hanlon,  Oct.  2000).  Though  Computer  Reseller  News  (et.  al.)  says:  "Those 
messages  are  clear:  1.  Know  us.  2.  Love  us.  3.  Buy  our  stock.  4.  Use  our 
products.  5.  Work  for  us,"  there  is  more  involved  here  than  simply  promoting 
business.  There  are  also  conflicting  reports  that  internet  companies  are 
cutting  back  on  their  television  advertising  for  the  lack  of  profits  (Friedman, 
Aug.  2000).  The  timing  of  these  reports  are  incongruent  and,  thus,  I  would 
suggest  that  the  conflict  between  them  is  suggestive  of  a  cultural  symptom. 
There  are  so  many  connections  technology  can  make,  so  many  things  it 
can  do  for  us,  that  it  seems  to  be  the  answer  to  all  our  needs  and  desires. 
Commercials  promoting  the  technological  paradigm  do  not  address  the 
negative  effects  of  technology,  nor  do  they  even  allow  us  to  make  informed 
decisions  about  our  involvement  in  the  use  of  technology. 

The  implication  is  that  technology  is  a  prevalent  new  paradigm,  not 
only  economically,  but  politically,  individually  and  socially,  as  well  (Martin, 
Gutman,  &  Hutton,  1988;  Mesthene,  1970;  Postman,  1992;  &  Shenk, 
1997).  Technology  suggests  a  value  system  to  our  culture  by  providing 
our  society  with  meaning  and  a  purpose  (to  advance  and  develop),  not  just 
substitutes  for  solutions  (Gibbs,  1999).  Therefore,  where  products  fail  to  give 
us  what  we  humans  need,  the  technological  future  provides  us  with  tangible 
results.  This  is  why  we  place  our  interminable  trust  in  technology  with  little 
required  explanation.  Where  we  have  become  discontent  with  the  hypocrisy 
of  commercialism,  government,  science,  and  religion,  technology  offers  a  new 
world  of  possibilities,  of  hope,  of  fulfillment.  In  the  past,  advertising  has  been 
in  this  same  situation,  creating  value  systems  and  cultural  paradigms  since 
the  late  1800's,  though  with  increasing  complexity  due  to  the  incorporation 
of  technology  (Marconi,  2001;  De  Mooij,  1998;  Salomon,  1979/1994;  & 
Schreiber,  2001).  Thus,  technology  holds  a  particularly  unique  place  within 
the  field  of  advertising.  Earlier  this  century,  ads  more  clearly  defined  what 
technology  could  do  and  how  it  operates.  The  fast  pace  of  advertisements 


Jenny  Kerr 

and  portrayal  of  the  future  is  now  so  confusing  and  disorienting  that  we  are 
unsure  of  what  commercials  are  actually  selling. 

Since  the  1950s,  Americans  have  fully  believed  in  the  power  of  technology. 
It  is  our  socially  collective  dreams  and  fantasies  that  are  reflected  in  advertising 
and  our  belief  in  science  and  technology,  combined  with  these  fantasies, 
makes  advertising  so  powerfully  persuasive.  However,  we  are  beings  who 
seek  truth  and  search  for  answers.  Though  communication  and  information 
technology  provide  a  means  to  finding  answers,  an  undoubted  belief  in  any 
approach  makes  it  ominous  and  fallible  (Kitalong,  2000).  Combining  the 
supernatural,  representative  in  the  "imaginary  and  symbolic  other"  (according 
to  Bacher  interpreting  Jaques  Lacan,  1993),  with  technology  and  science 
can  create  a  tension  in  discourse,  reflective  of  and  perhaps  contributing  to 
the  anxiety  and  feelings  of  discontent  made  so  apparent  in  the  prevalent 
violence  in  our  present-day  culture. 

"Nothing  in  our  glittering  technology  can  raise  man  to  new  heights, 
because  material  growth  has  been  made  an  end  in  itself  -  in 
the  absence  of  moral  purpose,  man  himself  becomes  smaller  as 
the  works  of  man  become  bigger.  ...The  sense  of  participation  is 
lost,  the  feeling  that  ordinary  individuals  influence  important 
decisions  vanishes,  and  man  becomes  separated  &  diminished" 
(King,  1983/1987,  19). 

There  are  some  who  are  suspicious  of  the  illusion  of  technological 
solutions,  the  authority  and  control  technology  has  over  our  lives,  and  the 
increasing  fragmentation  of  our  culture  as  a  result  of  technological  influence 
(Baudrillard,  1994;  Gergen,  1991;  Postman,  1992;  and  Shenk,  1997).  Yet, 
there  is  also  a  paradoxical  faith  in  technology  and  an  increased  reliance  on 
it  in  our  culture  (Mesthene,  1970  and  Tierney,  1993).  There  is  evident 
in  our  increasingly  globalized  American  society  a  criticism  and  support  of 
technology,  reflecting  the  dual  nature  of  the  paradigm.  Technology  can  be 
used  as  a  tool  for  almost  any  means.  Technology  can  be  a  simultaneously 
destructive  and  creative  force  in  our  culture.  In  fact,  any  human  endeavor, 
such  as  technology,  can  either  cure  or  kill  us. 

Havener  (2000-2001)  describes  this  phenomenon  in  terms  of  social 
systems.  Any  paradigm  can  be  an  open  or  closed  system.  He  asks  us  to 
consider  the  meaning  and  purpose  of  systematic  transactions  or  processes 
between  parties  (or  between  subjects  via  a  master  signifier,  according  to 
Bracher,  et.  al)  and  informs  us  that  "in  an  open  system,  the  critical  partners 
are  aware  of  their  interdependence  and... it  recognizes  both  parties,"  but  closed 


Advertising  Communications  Technology  on  Television:  Selling  a  Paradigm  -  A  Symptom  of  Our  Culture 

systems  remain  unaware,  become  static,  and  finally-  obsolete  (21,  et.  al). 
Open  systems  are  integrative  and  closed  systems  are  exclusive. 
Consumer  or  commercialistic  culture  is  mostly  concerned  with  cost/benefit 
or  profit  to  the  advertisers  and  marketing  companies  (Marconi,  2001  & 
Schreiber,  2001),  with  few  exceptions  of  companies  legitimately  concerned 
for  the  benefit  of  the  consumer  (Peppers  &  Rogers,  1993).  In  other  words, 
the  consumer  culture  of  the  advertising  age  is  a  closed  system,  bound  to  come 
to  a  close  as  it  is  seen  more  and  more  to  be  less  fulfilling. 

"We  are  prone  to  judge  success  by  the  index  of  our  salaries  or  the  size 
of  our  automobiles,  rather  than  by  the  quality  of  our  service  and 
relationship  to  humanity. "  (King,  1983/1987,  21). 

"The  ultimate  measure  of  a  man  is  not  where  he  stands  in  moments 
of  comfort  and  convenience,  but  where  he  stands  at  times  of  challenge 
and  controversy"  (24,  King,  et.  al). 

Thus,  the  commodities  we  once  thought  could  fulfill  our  deepest  desires 
are  increasingly  seen  as  inadequate,  though  we  may  automatically  respond  to 
them  (Berger,  2000).  Our  culture  is  becoming  more  and  more  discontent 
with  the  answers  provided  by  advertising.  "In  our  loquacious  age,  saturated 
with  political  slogans  and  advertisements,  (listening)  is  liable  to  be  a  difficult 
enterprise..."  (Dallmore,  1984,  191).  In  fact,  we  are  beginning  to  tune  them 
out,  with  the  help  of  technology! 

One  new  device  allows  for  television  viewers  to  omit  commercials  from 
the  programs  they  are  viewing  (Doyle,  1992).  So,  though  technology  remains 
commercial  at  present,  it  is  possible  that  the  technological  culture  could 
replace  our  advertising  culture  in  an  effort  for  society  to  find  more  rewarding 
and  meaningful  endeavors,  as  we  grow  within  a  more  global  realm. 

Baudrillard,  philosopher  and  writer  of  modern  technological  issues,  states: 
"currently,  the  most  interesting  aspect  of  advertising  is  its  disappearance,  its 
dilution  as  a  specific  form,  or  even  as  a  medium"  (1994,  p.90).  Heidegger 
says:  "we  are  questioning  technology  in  order  to  bring  to  light  our  relationship 
to  its  essence"  (1977,  p.23).  So,  it  seems  that  technological  advertisements 
point  to  a  cultural  phenomenon  of  desire,  as  all  advertisements  point  to 
desire  (Bracher,  1993).  Referencing  Emile  Durkheim's  premise:  "to  diminish 
international  hostilities"  we  should  "enhance  a  broader  sense  of  community" 
and  "move  to  a  global  ideology,"  R.P.  Cuzzort  (1989)  suggests  that  in  order  to 
do  this,  "people  would  need  to  find  a  way  to  create  collective  representations 
of  a  global  nature  that  could  be  as  effective  as  those  of  a  nationalistic  nature" 
(p.  109).    Such  a  collective  representation  appeared  in  Alcatel's  ad  -  Martin 


Jenny  Kerr 

Luther  King,  a  deep  social  symbol  of  freedom  and  human  rights.    The 
American  dream  is  made  possible  through  technology. 

This  and  other  such  advertisements  specifically  focusing  on  communication 
technology  are  unique  in  their  presentation  of  a  human  need  to  help,  to  be 
social,  to  enact  social  change  and  participate  in  the  grand  scale  of  globalization 
(Farley,  1996).  The  themes  of  technological  advertisements  of  educational 
technology  (computers,  search  engines),  communications  (cell-phones, 
e-mail,  translation  &  voice- recognition  software),  and  identity  (system 
controls,  electronic  identity  protection)  seem  to  point  to  a  desire  for  human 
interconnection.  This  is  obvious  when  we  consider  the  slogans  of  various 
companies  in  their  television  commercials:  "Connecting  People"  {Minolta), 
"What  do  you  have  to  say?"  {Cingular  Wireless),  and  "The  power  to  bring 
people  together..."  {Alcatel).  In  effect,  Alcatel,  like  other  companies  marketing 
technological  products  for  communication,  education,  and  social  interaction 
are  selling  us  a  community  and  a  new  society  within  which  we  can  make 
a  difference  and  find  new  possibilities.  Therefore,  these  commercials  use 
images,  representations,  symbols,  and  signifiers  that  are  culturally  loaded 
with  meaning  (such  as  the  "V  for  Victory"  sign  of  Verizon  Wireless,  reflecting 
the  revolutionary  freedom  of  the  1960s).  With  slogans,  such  as:  "People 
everywhere  just  gotta'  be  free!"  {Verizon  Wireless),  ads  currently  speak  to  the 
desire  for  a  new  social  and  cultural  revolution. 

Signifying  the  New  Paradigm 

This  is  the  transition  from  the  Advertising  Age  to  the  Technological  Era. 
Therefore,  these  commercials  target  a  majority  of  our  population  to  increase 
interest  in  not  only  the  products,  but  also  an  entire  mentality,  which  leads  us 
into  a  new  paradigm.  Perhaps  this  paradigm  shift  is  a  direct  result  of  human 
population  growth  and  globalization:  allowing  less  room  on  the  planet  for 
independence,  the  project  of  nationalization  and  attempts  at  economic 
self-sufficiency.  Thus,  this  shift  could  be  compensating  for  the  isolation  and 
separation  experienced  by  many  within  our  society,  due  to  our  past  cultural 
emphases.  So,  as  advertising  and  technological  paradigms  overlap,  we  may 
seek  some  sort  of  stability  within  the  confusion  of  images  and  obscurity  of 
messages.  According  to  Bracher  (1993),  we  attempt  to  find  this  grounding 
and  connection  through  identification  and  current  commercials  give  us 
cultural  and  historical  figures  with  which  many  of  us  desire  identification. 
"Identifications  that  can  prompt  us  to  feel  and  act  in  certain  ways...  can 
also  re-form  or  alter  our  foundational,  structural  identifications  and  thus 
change  our  subjectivity  and  our  behavior  as  well"  (Bracher,  22,  et.  al). 


Advertising  Communications  Technology  on  Television:  Selling  a  Paradigm  -  A  Symptom  of  Our  Culture 

Though  the  persuasion  of  our  culture  into  a  post-modern  technological 
world  began  almost  100  years  ago,  the  full  realm  of  possibilities  of  this 
era  have  only  just  begun. 

In  conclusion,  technology  both  helps  create  and  rallies  to  fulfill  our  desires 
for  interpersonal  human  connection,  intimacy,  knowledge,  protection  & 
safety,  speed  &  efficiency,  and  value  (of  life,  as  perception,  as  reflected  in 
objects,  and  of  time).  For  some,  technology  is  the  means  to  live  and  for  others 
it  is  a  new  hope  for  the  future  and  impetus  for  change. 

There  is,  however,  the  possibility  that  technology  -though  increasing 
in  availability  to  the  masses-  will  be  a  provision  for  the  elite.  If  this  becomes 
the  case,  then  will  the  distinction  between  the  advertising  and  technological 
cultures  increase  or  decrease?  Are  we  moving  away  from  a  consumer  culture 
or  delving  so  deep  into  it  that  we  are  even  selling  ourselves  in  today's  mass- 
market  economy?  Evidence  for  this  is  on  both  a  personal  level  (job  resumes 
and  websites)  and  on  a  global  political  and  economic  level  (through  the  stock 
market).  We  could  just  move  to  selling  human  beings  and  entire  companies 
instead  of  individual  products  and  items.  Yet,  the  increase  in  technology  can 
not  be  denied.  The  question  is:  "what  is  next?". 

Society's  demand  dictates  what  is  advertised  and  sold  to  us  and 
today  we  seem  to  be  moving  away  from  actual  products  and  toward  more 
services  and  procedure...  access  to  information,  communication,  abilities, 
international  relations,  connectivity,  speed  and  efficiency,  convenience, 
leisure,  activity,  etc. 

So,  technology  offers  itself  as:  "The  wave  of  the  future"  and  attempts  to 
provide  a  new  answer  to  our  desires.  As  we  explore  our  collective  transitioning, 
we  may  find  that  the  cultural  symptom  of  technological  advertising  points  to 
more  distinct  aspects  of  human  existence,  as  our  culture  is  ever-changing. . .  so 
are  the  signifiers  and  symptoms.  We  can  only  hypothesize  what  technology 
heralds  is  upon  the  horizon  through  analyzing  various  means  and  looking 
at  specific  paradigmatic  shifts.  It  seems,  at  the  moment,  that  in  the  cultural 
symptom  of  technological  ads,  we  see  much  less  objectification  of  the 
other,  but  images  and  symbols  of  an  objectified  subject.  In  other  words, 
technological  advertisements  address  deeper  needs  than  superficial  desires 
than  product  advertisements.  They  are  representative  of  attainable  qualities 
to  which  we  aspire  in  life,  attributes  which  depend  on  us  -as  individuals-  to 
fulfill  (closeness,  intimacy,  security,  purpose,  and  value),  rather  than  idealized 
things  we  wish  to  acquire  (a  happy  home,  a  wonderful  family,  a  good  job, 
an  exceptional  lover,  an  entertaining  social  life).  The  ads'  perspectives  have 
changed,  but  the  desires  are  indicative  of  the  Western  and  American  values 


Jenny  Kerr 

inherent  to  our  culture:  independence,  autonomy,  and  individual  freedom. 
Hence,  King's  words  ring  as  true  today  as  ever  before....  "It  is  a  dream  deeply 
rooted  in  the  American  dream"  (p.95,  et.  al.). 

References 

Baudrillard,  J.  (1994).  Simulacra  and  Simulation.  (S.  R  Glaser,  trans.).  Ann  Arbor, 
Mich.:  University  of  Michigan  Press. 

Berger,  A.  A.  (2000).  Ads,  Fads,  and  Consumer  Culture:  Advertising's  Impact  on 
American  Character  and  Society.  NY:  Rowman  &  Littlefield  Publishers,  Inc. 

Boihem,  H.  &  Rmmanouilides,  C.  (1996)  The  Ad  and  the  Ego:  Truth  and  Conse- 
quences. [Videorecording] .   Parallax  Pictures.  San  Francisco,  CA:  California 
Newsreel. 

Bracher,  M.  (1993).  Lacan,  Discourse,  and  Social  Change:  A  Psychoanalytic  Cultural 
Criticism.  Ithaca,  NY:  Cornell  University  Press. 

Cuzzort,  R.  P.  (1989).  Using  Social  Thought:  The  Nuclear  Issue  and  Other  Concerns. 
Mountain  View,  CA:  Mayfield  Publishing,  Co. 

Dallmore,  R  R.  (1984).  language  &  Politics:  Why  Does  Language  Matter  to  Political 
Philosophy?  Notre  Dame,  IN:  University  of  Notre  Dame  Press. 

De  Mooij,  M.  (1998).  Global  Marketing:  Understanding  Cultural  Paradoxes.  Thou- 
sand Oaks,  CA:  Sage  Publications. 

Doyle,  M.  (1992).  The  Future  of  Television:  A  Global  Overview  of  Programming, 
Advertising,  Technology,  and  Growth.  Lincolnwood,  IL:  NTC  Business  Books. 

Farley,  E.  (1996).  Deep  Symbols:  Their  Postmodern  Effacement  and  Reclamation. 
Valley  Forge,  PA:  Trinity  Press  International. 

Friedman,  W.  (Aug  7,  2000).  "Dot-Corns  Give  Commercials  a  Break."  Advertising 
Age.  Chicago:  Crain  Communications.  71/33.  p.  S36. 

Garber,  M.  (2000).  Symptoms  of  Culture.  NY:  Routledge. 

Gergen,  K.  (1991).  The  Saturated  Self:  Dilemmas  of  Identity  in  Contemporary  Life. 
NY:  Basic  Books. 

Gibbs,  R.  (1999).  Intentions  in  the  Experience  of  Meaning.  NY:  Cambridge  Univer- 
sity Press. 

Harvard  University  Program  on  Technology  and  Society.  (1970).  Technology  and 
the  Individual:  Research  Review  No.  6.  Cambridge,  Mass.:  Harvard  University 
Press. 

Harvard  University  Program  on  Technology  and  Society.  (1971).  Technology  and 
Social  History:  Research  Review  No.  8.  Cambridge,  Mass.:  Harvard  University 
Press. 


Advertising  Communications  Technology  on  Television:  Selling  a  Paradigm  -  A  Symptom  of  Our  Culture 

Havener,  C.  (December,  2000-January,  2001).  Fear  and  Anxiety:  They're  in  the 
System.  AHP  Perspective.  San  Francisco,  CA:  Association  for  Humanistic  Psy- 
chology. 20-22. 

Heidegger,  M.  (1977).    The  Question  Concerning  Technology  and  Other  Essays.  (W. 
Lovitt,  trans.).  NY:  Harper  Torchbooks. 

King,  M.L.  (1983/1987).  The  Words  of  Martin  Luther  King,  Jr.  (Selected  by  Coretta 
Scott  King).  NY:  Newmarket  Press. 

Kitalong,  S.  K.  (July  2000).  "You  will":  Technology,  Magic,  and  the  Cultural  Contexts 
of  Technical  Communication.  Journal  of  Business  and  Technical  Communication; 
Thousand  Oaks.  14/3;  289-314. 

Marconi,  J.  (2001).  Future  Marketing:  Targeting  Seniors,  Boomers,  and  Generations  X 
and  Y.  Linclolnwood,  IL:  NTC  Business  Books. 

Martin,  L.  H.;  Gutman,  H.;  &  Hutton,  PH.  (eds.).  (1988).  Technologies  of  the  Self: 
A  Seminar  with  Michel  Foucault.  Amherst:  The  University  of  Massachusetts 
Press. 

Mesthene,  E.  G.  (1970).  Technological  Change:  Its  Impact  on  Man  and  Society. 
Cambridge,  Mass:  Harvard  University  Press. 

O'  Hanlon,  C.  (Oct  16,  2000).  "Reaching  a  Bigger  Audience."  Computer  Reseller 
News.  Manhasset.  Issue  916,  38-51 

Peppers,  D.  &  Rogers,  M.  (1993).  The  One  to  One  Future.  NY:  Currency,  Double- 
day  Postman,  N.  (1992).  Technopoly:  The  Surrender  of  Culture  to  Technology.  NY: 
Vintage  Books. 

Potter,  J.  &  Wetherell,  M.  (1987).  Discourse  and  Social  Psychology:  Beyond  Attitudes 
and  Behavior.  Beverly  Hills,  CA.:  Sage  Publications. 

Ruskin,  G.  (April  23,  2001).  Commercial  Alert  Criticizes  Alcatel  Over  GerigAd. 

[On-Line  Available]  http://lists.essential.org/pippermail/commercial-alert/200 1  / 

000072.html  See  Also:  http://www.commercialalert.org 

Salomon,  G.  (1979/1994).  Interaction  of  Media,  Cognition,  and  Learning.  Hillsdale, 
NJ:  Lawrence  Erlbaum  Associates,  Publishers. 

Sampson,  E.  E.  (1991).  Social  Worlds,  Personal  Lives:  An  Introduction  to  Social 
Psychology.  NY:  Harcourt,  Brace,  Jovanovich  Publishers. 

Schreiber,  A.L.  (2001).  Multicultural  Marketing:  Selling  to  the  New  America.  Linclol- 
nwood, IL:  NTC  Business  Books. 

Shenk,  D.  (1997).  Data  Smog:  Surviving  the  Information  Glut.  NY:  HarperEdge. 

Tierney,  T.  E  (1993).  A  Genealogy  of  Technical  Culture:  The  Value  of  Convenience. 
NY:  State  University  of  New  York  Press. 


10 


E-Invasion  of  Privacy 

Cole  D.  Taratoot 
Virginia  Polytechnic  Institute  and  State  University 

Introduction 

In  the  public  sector  there  are  many  issues  that  a  manager  may  have  to 
face.  One  of  those  issues  is  examined  in  the  case  of  "Ann's  Dilemma,"  a 
fictional  personnel  scenario  depicted  in  Robert  Golenbiewski's,  Cases  in 
Public  Management.  In  this  story,  Ann  Czaplicki  had  a  degree  in  English 
Literature,  which  did  not  exactly  put  her  in  high  demand.  Through  a  family 
friend,  Harry  Goetz,  Ann  was  given  a  job  at  the  state  Health  Department. 
After  lots  of  hard  work,  Ann  is  able  to  move  her  way  up  in  the  organization. 
One  afternoon  Ann  is  asked  to  see  Goetz  before  she  leaves  to  go  home. 
Goetz  quickly  asks  Ann  for  a  favor.  Goetz  tells  Ann  of  his  suspicions  of 
one  employee's  unethical  activity  and  asks  for  Ann's  help.  Goetz  wants  Ann 
to  not  only  watch  the  employee  closely,  but  then  goes  even  farther  when 
he  asks  Ann  to  go  through  the  drawers  of  the  employee's  desk  to  find  some 
incriminating  evidence.  After  reminding  Ann  that  he  gave  her  the  job, 
Goetz  seems  to  feel  that  Ann  owes  him  this  favor.  "I  appreciate  what  you 
have  done  for  me  Mr.  Goetz,"  Ann  responds,  "but  I  still  feel  a  little  funny 
about  going  through  someone's  desk."  Ann  then  asks  Mr.  Goetz  to  give  her 
the  night  to  make  the  decision  of  whether  or  not  to  go  through  the  desk 
(Golembiewski,  et.  al,  60-62). 

Ann  is  faced  with  a  very  important  decision  at  her  job.  This  decision 
raises  into  question  many  issues  ranging  from  ethical  actions  in  the  public 
sector  to  the  failure  to  follow  a  manager's  orders.  One  of  the  most  important 
issues  that  it  raises,  however,  is  the  right  of  privacy  in  the  public  sector. 
Does  Ann  have  the  right  to  go  the  desk  of  this  employee?  Is  this  a  violation 
of  the  right  of  privacy? 

To  examine  these  questions  it  is  important  to  examine  many  aspects  of 
the  right  of  privacy.  This  includes,  first,  the  many  areas  in  which  the  right 
of  privacy  may  be  involved.  Second,  the  policies  that  have  been  enacted  by 
Congress  with  regards  to  the  right  of  privacy  should  be  discussed.  Third,  the 
many  court  cases  that  have  come  about  as  a  result  of  these  policies  and  the 
right  of  privacy  must  be  analyzed.    Last,  the  precedents  established  through 

11 


E-Invasion  of  Privacy 

legislation  and  the  courts  with  regards  to  the  right  of  privacy  in  both  the 
public  and  private  sector  will  be  examined. 

Legislative  and  Legal  Issues 

Sometimes  the  right  of  privacy  is  merely  thought  of  as  the  right  to  do  what 
we  want  in  our  own  homes,  but  privacy  issues  may  extend  into  realms  much 
farther  and  more  complicated  than  this.  In  the  case  of  "Ann's  Dilemma," 
privacy  might  involve  the  worker's  right  to  keep  the  employer  from  going 
through  his  or  her  desk.  Samoriski,  Huffman,  and  Trauth  give  us  "four 
branches  of  privacy  invasion.  These  divisions... include  publication  of  true 
but  embarrassing  facts,  false  light  or  defamation,  appropriation,  and  intrusion 
into  physical  solitude  or  seclusion."  Don  Cozzetto  makes  it  clearer  when  he 
states,  "Historically,  privacy  and  the  public  employment  involved  five  major 
areas  —  recruitment  and  promotion,  life  style,  personal  habits,  workplace 
searches,  and  drug  testing"  (Cozzetto  A,  21). 

One  of  the  reasons  that  privacy  has  become  a  hotter  issue  is  due  to  the 
increase  in  the  amount  of  technology.  "A  wide  array  of  new  technological 
devices  are  available  to  employers  to  monitor  employee  activities.  These 
devices  include  the  accounting  and  monitoring  of  phones  calls,  oversight  of 
the  efficiency  and  accuracy  of  computer  operations,  computerized  surveillance 
of  vehicle  usage,  tracking  of  employee  location,  auditing  of  employees' 
computer  files,  tapping  of  email  transfers,  and  observation  of  the  workplace 
by  video  camcorders"  (Cozzetto  B,  519). 

Technology  also  opens  the  door  to  a  wide  variety  of  areas  that  employees 
are  calling  private.  Some  of  these  areas  include  electronic  mail,  electronic 
bulletin  boards,  computer  hard  drives,  telephone  conversations,  cell  phone 
conversations  as  well  as  a  variety  of  other  issues  (Cozzetto  A,  21-24).  It  also 
gives  employees  the  ability  to  be  able  to  monitor  management  {CQ Researcher, 
1024).  With  small  video  recorders  or  other  equipment,  employees  may  be 
able  to  become  more  effective  whistleblowers  with  more  sufficient  evidence 
captured  with  this  technology  (CQ  Researcher,  1024).  Of  course  there  are 
other  issues  involving  privacy  that  do  not  have  to  do  with  technology,  such 
as  medical  records  and  personal  records  such  as  credit  history,  criminal 
record,  or  mental  health  record. 

Congress  has  tried  on  numerous  attempts  to  address  the  myriad  of  issues 
that  are  involved  with  the  right  of  privacy.  One  of  the  problems  in  the  public 
sector  is  the  attempt  to  maintain  a  balance  of  individual  privacy  while  still 
making  government  information  available  to  the  public  under  such  laws  as 
the  Freedom  of  Information  Act.  One  of  the  first  acts  to  be  passed  in  regards 

12 


Cole  D.  Taratoot 

to  privacy  was  the  Privacy  Act  of  1974  (Cozzetto  A,  28).  The  Privacy  Act 
of  1974  includes  "restrictions  on  gathering  information  on  individuals  and 
it  indicates  that  any  information  used  in  an  adverse  personnel  action  shall 
to  the  extent  practicable,  be  obtained  directly  from  the  individual  (Cozzetto 

A,  28).  Another  closely  related  law,  the  Americans  with  Disabilities  Act 
of  1990,  "prevents  medical  inquiries  as  a  condition  to  an  employment 
offer"  (Cozzetto  A,  28). 

With  the  growth  of  technology,  Congress  has  also  tried  to  address  new 
issues  in  privacy.  Congress  faces  a  tough  challenge  because  "advances 
in  workplace  technology  render  existing  safeguards  obsolete  before  new 
can  be  erected  in  their  place"  (CQ  Researcher,  1024).  Two  of  the  most 
major  attempts  by  Congress  to  address  these  issues  have  been  the  Federal 
Wiretap  Act  and  the  Electronic  Communications  Privacy  Act  of  1986 
(Cozzetto  B,  517,  520). 

The  Federal  Wiretap  Act  "prohibits  both  private  and  public  employers 
from  intercepting  and  recording  the  'wire  communications'  of  employees" 
(Cozzetto  B,  517).  The  first  thing  that  is  distinguished  in  this  act  though, 
is  that  it  is  the  content  of  the  conversations  that  are  protected  (Cozzetto 

B,  517).  An  employer  may  monitor  the  use  of  the  phone  to  determine 
if  an  employee  is  using  a  phone  for  an  unauthorized  call  (Cozetto,  23). 
Also,  an  employer  may  record  or  monitor  calls  if  the  employees  have  given 
prior  consent  (Cozetto,  23). 

One  of  the  most  controversial  and  vague  pieces  of  privacy  legislation 
passed  by  Congress  was  the  Electronic  Communications  Privacy  Act  (ECPA) 
of  1986.  The  ECPA  "was  passed  to  amend  Title  III  of  the  Omnibus  Crime 
Control  and  Safe  Streets  Act  of  1968  (Samoriski,  67).  The  purpose  of  Title 
III  was  to  help  limit  the  power  of  government  to  be  able  to  monitor  or 
intercept  "telephone  communications"  (Samoriski,  67).  The  purpose  of  the 
ECPA  was  to  help  amend  an  outdated  piece  of  legislation  (Rodriguez,  1448). 
"Of  the  changes  implemented  by  the  ECPA,  perhaps  the  most  significant 
was  the  insertion  of  the  term  'electronic  communication'  wherever  Title 
III  previously  only  protected  wire  and  oral  communications"  (Rodriguez, 
1448).  Many  of  the  previsions  of  the  ECPA  were  enacted  to  help  prevent 
unauthorized  persons  from  gaining  access  to  information  that  was  not 
intended  to  be  public  (Rodriguez,  1449).  One  of  the  many  debates  that 
arose  from  the  passage  of  the  ECPA  was  the  issue  of  whether  or  not  electronic 
mail  would  be  covered  by  the  provisions  of  the  Act  (Rodriguez,  1449). 
"Elements  of  the  ECPA  legislative  history  provide  some  support  for  the 
position  that  Congress  did  not  intend  to  inhibit  employers  from  reviewing 

13 


E-Invasion  of  Privacy 

employee-generated  E-mail  files.  Moreover,  much  of  the  testimony  during 
the  Senate  hearing  on  the  proposed  legislation  reflected  an  overriding  concern 
for  company,  rather  than  individual  employee  privacy"  (Cozzetto  B,  520). 
The  ECPA  does  draw  one  distinction  with  regards  to  e-mail  privacy  (Cozzetto 
B,  521).  "The  ECPA  allows  far  more  latitude  if  stored  data  is  retrieved  by 
the  employer  rather  than  data  that  is  intercepted"  (Cozzetto  B,  521).  Even 
though  this  is  stated,  it  still  does  not  delineate  a  clear  policy  of  how  email 
privacy  will  be  handled.  This,  along  with  other  issues,  would  be  settled  in 
many  of  the  cases  that  would  come  before  the  courts. 

The  courts  in  the  United  States  are  addressing  many  of  these  privacy  issues 
everyday  as  a  result  of  the  growth  in  technology  as  well  as  the  enactment  of 
new  legislation.  One  case  that  closely  relates  the  dilemma  presented  in  the 
story  of  Ann  is  that  of  Ortega  v.  O'Connor.  In  this  case  Dr.  Magno  Ortega 
had  been  asked  to  take  an  administrative  leave  due  to  action  taken  against  him 
for  sexual  harassment  and  inappropriate  disciplinary  action  against  a  resident 
(480  U.S.  709,  1987).  "While  he  was  on  administrative  leave  pending 
investigation  of  the  charges,  hospital  officials,  allegedly  in  order  to  inventory 
and  secure  state  property,  searched  his  office  and  seized  personal  items 
from  his  desk  and  file  cabinets  that  were  used  in  administrative  proceedings 
resulting  in  his  discharge"  (480  U.S.  709,  1987).  In  its  decision,  "the  Court 
notes  that  'Individuals  do  not  lose  Fourth  Amendment  rights  merely  because 

they  work  for  the  government  instead  of  a  private  employer Given  the  great 

variety  of  work  environments  in  the  public  sector,  the  question  of  whether 
an  employee  has  reasonable  expectation  of  privacy  must  be  addressed  on  a 
case  by  case  basis'"  (Samoriski,  64).  The  Court  ultimately  made  the  decision 
that  the  employer  did  have  the  right  to  go  through  the  desk  of  the  employee 
without  violating  a  right  of  privacy  (480  U.S.  709,  1987). 

In  another  case,  Smyth  v.  The  Pillsbury  Company,  the  issue  of  privacy 
involving  electronic  mail  would  come  to  the  forefront  in  the  state  of 
Pennsylvania  (914  E  Supp.  97).  In  this  case,  the  Pillsbury  Company 
"maintained  an  electronic  communication  system  in  order  to  promote 
internal  corporate  communications  between  its  employees"  (914  E  Supp.  97). 
"Pillsbury  assured  its  employees,  including  the  plaintiff  (Smyth),  that 
e-mail  communications  could  not  be  intercepted  and  used... against  its 
employees  as  grounds  for  termination  or  reprimand"  (914  E  Supp.  97).  After 
having  a  correspondence  with  a  superior  from  home,  Smyth's  e-mails  were 
intercepted  by  the  Pillsbury  Company  (914  E  Supp.  97).  Smyth  was  then 
fired  for  "transmitting  what  it  deemed  to  be  inappropriate  and  unprofessional 
comments"  (914  E  Supp.  97).    Smyth  claimed  "that  his  termination  was  in 

14 


Cole  D.  Taratoot 

violation  of  'public  policy  which  precludes  an  employer  from  terminating 
an  employee  in  violation  of  the  employee's  right  to  privacy  as  embodied  in 
Pennsylvania  common  law'"  (914  F.  Supp.  97).  Even  with  these  claims, 
however,  the  court  did  not  rule  in  favor  of  Smyth  saying,  "We  do  not  find  a 
reasonable  expectation  of  privacy  in  e-mail  communications  voluntarily  made 
by  an  employee  to  his  supervisor  over  the  company  e-mail  system. .  .Once  the 
plaintiff  (Smyth)  communicated  the  alleged  unprofessional  comments  to  a 
second  person  (his  supervisor)  over  an  e-mail  system  which  was  apparently 
utilized  by  the  entire  company,  any  reasonable  expectation  of  privacy  was 
lost"  (914  E  Supp.  97). 

The  case  of  "  Steve  Jackson  Games  Incorporated,  et  al.  v.  United  States  Secret 
Service,  United  States  of  America  et  al.  (1993)  broke  new  legal  ground  by 
becoming  the  first  case  in  which  the  seizure  of  electronic  communications  on 
a  bulletin  board  was  found  to  be  illegal  under  the  Electronic  Communications 
Act  of  1986"  (Samoriski,  70).  The  Secret  Service  believed  that  an  employee 
of  Steve  Jackson  Games  was  involved  in  the  theft  of  materials  from  BellSouth 
(Samoriski,  70).  After  obtaining  a  search  warrant,  the  Secret  Service 
confiscated  three  computers  from  Steve  Jackson  Games,  one  of  which  was 
used  to  run  an  electronic  bulletin  board  (Samoriski,  70).  Steve  Jackson 
Games  sued  under  the  ECPA  and  was  awarded  $50,000  for  what  Judge 
Sparks  said  "violated  the  safeguards  contained  in  the  ECPA  designed  to 
protect  computer  systems  and  their  data  from  unwarranted  intrusion" 
(Samoriski,  71). 

There  have  been  many  other  cases  involving  privacy  as  well.  In  Katz 
v.  United  States,  the  "issue  was  whether  an  electronic  bug  placed  by  the 
government  on  a  public  telephone  booth  was  a  violation  of  the  Fourth 
Amendment"  (Cozzetto  B,  517).  The  government  made  claim  that  the  phone 
booth  was  not  protected  due  to  the  fact  that  it  was  located  in  a  public  place 
(Cozzetto  B,  517).  The  court  noted  that  it  was  not  places  that  were  protected 
by  the  Fourth  Amendment,  but  individuals  (Cozzetto  B,  517).  Other  cases 
include  the  "1994  Supreme  Court  decision,  Department  of  Defense  v.  Federal 
Labor  Relations  Authority,  which  upheld  the  interests  of  employees  in  seeing  to 
it  that  their  home  addresses  were  not  given  out  to  federal  agencies"  (Cozzetto 
B,  515).  In  the  case  of  Bourke  v.  Nissan  Motor  Corporation,  two  females 
challenged  their  release  from  Nissan  based  on  privacy  rights  (Cozzetto  B, 
521).  When  a  supervisor  heard  that  he  might  have  been  the  target  of  some 
negative  comments,  he  overrode  the  e-mail  passwords  of  the  two  women 
and  found  evidence  to  support  the  claims  (Cozzetto  B,  521).    The  court 


15 


E-Invasion  of  Privacy 

ruled  in  favor  of  the  employer  stating  that  there  was  no  violation  of  the  right 
of  privacy  (Cozzetto  B,  521). 

With  all  of  these  cases  facing  the  issue  of  privacy  it  can  be  hard  for  one  to 
ascertain  what  accepted  norms  of  privacy  should  be.  As  mentioned  before,  the 
major  issue  is  employee  privacy  rights  versus  the  employer's  need  to  monitor 
the  workplace  for  unaccepted  behavior.  Cozzetto  and  Pedeliski  suggest 
a  three-prong  test  established  in  such  cases  such  as  Griggs  v.  Duke  Power, 
Kelly  v.  Johnson,  and  Padula  v.  Webster  (Cozzetto  A,  21).  The  three-prong 
test  requires  that  searches  "must  be  reasonable,  the  employer  must  have 
compelling  interest  in  conducting  them,  and  the  incursions  must  be  job 
related"  (Cozzetto  A,  21).  An  employer  would  satisfy  the  compelling  interest 
portion  of  the  test  if  the  search  were  being  conducted  to  protect  employees 
from  items  such  as  sexual  harassment,  racism,  or  any  other  factor  that  may 
lead  to  a  hostile  workplace  (Cozzetto  A,  22).  Also  an  employer  would  meet 
the  compelling  interest  test  if  the  employer  was  trying  to  protect  its  own 
interests  such  as  "reducing  theft  to  preventing  copyright  infringement  to 
prohibiting  transmission  of  pornographic  materials  via  office  communications 
systems"  (Cozzetto  A,  22).  To  simplify,  Rodriguez  says,  "As  a  general  rule, 
to  win  an  invasion  of  privacy  suit  against  any  type  of  employer,  an  employee 
must  first  be  able  to  prove  an  expectation  of  privacy  that  outweighs  the 
employer's  reasons  for  monitoring."  One  thing  that  is  clear  is  that  an 
employer  will  be  given  preference  "if  the  workplace  continues  to  have  signs  of 
dysfunctional  and  destructive  behaviors"  (Cozzetto  B,  524). 

A  different  test  used  by  some  military  courts  takes  a  different  approach 
when  it  comes  to  electronic  mail  (Samoriski,  73).  This  two-pronged  test 
says  "that  a  person  asserting  a  right  to  privacy  under  the  Fourth  Amendment; 
1.  Must  exhibit  an  actual  (subjective)  expectation  of  privacy,  and  2.  The 
individual's  subjective  expectation  of  privacy  must  be  one  that  society  is 
prepared  to  recognize  as  reasonable  (objective)"  (Samoriski,  73). 

With  all  of  these  difficulties,  it  is  hard  to  imagine  there  is  any  way  to 
maintain  a  balance  in  the  workplace.  Many  different  experts  suggest  different 
things  for  agencies  and  companies  to  try  when  dealing  with  the  issue  of 
privacy.  Cozzetto  and  Pedeliski  suggests  "a  balance  must  be  struck  between 
employer  and  employee  interests  in  privacy,  a  balance  that,  in  the  end, 
allows  for  the  surveillance  under  certain  limited  conditions,  stressing  less 
intrusive  approaches."  "Management  seems  receptive  to  the  idea  that 
curbing  workplace  surveillance  'allows  organizational  change  to  occur  more 
easily'"  (CQ  Researcher,  1027).  Moroney,  a  member  of  the  Electronic  Mail 
Association,  says,  "We  encourage  companies  to  develop  privacy  policies 

16 


Cole  D.  Taratoot 

for  all  forms  of  communications  and  to  tell  employees  what  they  are"  (CQ 
Researcher,  1027).  With  regards  to  privacy  rights  and  electronic  mail,  most 
say  that  the  best  approach  for  an  employer  to  take  is  to  notify  employees  in 
advance  that  all  electronic  mail  messages  have  the  potential  to  be  monitored 
(Cozzetto  B,  522).  Cozzetto  and  Pedeliski  also  suggest  a  twelve-point  model, 
which  includes  different  suggestions  on  how  employers  should  handle  privacy 
in  the  public  sector  (Cozzetto  A,  29-30). 

Conclusions 

It  seems  that  Congress  is  not  reacting  quickly  enough  to  all  of  the  issues 
that  are  developing  as  a  result  of  new  technology.  One  thing  that  is  not  clear 
is  what  differentiates  postal  mail  from  electronic  mail  in  regards  to  privacy. 
As  technologies  develop,  more  pressure  will  be  placed  on  not  only  Congress, 
but  also  the  courts  to  determine  what  correct  policy  should  be.  Hopefully, 
there  will  come  a  time  when  Congress  becomes  proactive  rather  than 
reactive.  Until  this  time,  it  will  be  up  to  agencies  and  companies  to  maintain 
policies  that  not  only  satisfy  employees,  but  also  keep  the  organization 
running  smoothly. 

References 

Cozzetto  Don  A.  and  Theodore  B.  Pedeliski.  "Privacy  and  the  Workplace:  Implica- 
tions for  Managers."  Review  of  Public  Personnel  Administration  21(1996):  21-30. 

Cozzetto  Don  A.  and  Theodore  B.  Pedeliski.  "Privacy  and  the  Workplace:  Technol- 
ogy and  Public  Employment."  Public  Personnel  Management  26,  No.  4  (1997): 
515-525. 

Golembiewski,  Robert,  et  al.  Cases  in  Public  Management.  Itasca:  Peacock  Publish- 
ers Inc.,  1997. 

"Looking  for  Compromises."   CQ  Researcher  3,  No.  43  (1993):  1024-1026. 

Michael  A.  Smyth  v.  The  Pillsbury  Company,  914  F.  Supp.  97,  1996  U.S.  Dist. 

O'Conner  v.  Ortega,  480  U.S.  709  (1987). 

Rodriguez,  Alexander  I.  Emory  Law  Journal  47  (1998):  1439-1473. 

Samoriski,  Jan  H.  et  al.  Journal  of  Broadcasting  and  Electronic  Media  40 
(1996):  60-76. 


17 


Geographic  Information  Technologies  and  Their 
Potentially  Erosive  Effects  on  Personal  Privacy 

Marc  P.  Armstrong 

University  of  Iowa 

Abstract 

The  ability  of  individuals  and  organizations  to  compromise  the  personal 
privacy  of  others  through  the  use  of  geo-spatial  technologies,  such  as  remote 
sensing  and  geographic  information  systems  (GIS),  is  increasing  at  a  rapid 
pace.  Commercial  remote  sensing  satellites  now  have  a  resolution  of  1 
meter  and  sub-meter  systems  are  being  developed.  Using  the  capabilities 
provided  by  inexpensive  GIS  software,  it  has  also  become  easy  to  attach 
personal  identifiers  (such  as  addresses  and  telephone  numbers)  to  symbols 
on  maps.  During  the  past  several  years,  an  explosive  growth  in  the  number 
of  cellular  telephones  has  spawned  a  new  and  largely  unregulated  industry, 
called  location-based  services,  that  first  establishes  the  current  location  of 
cell  phone  users  and  then  provides  them  with  location  and  context-specific 
information.  There  is  a  significant  potential  to  collect,  synthesize  and 
disseminate  information  about  the  personal  spatial  behavior  and  revealed 
preferences  of  individuals  who  use  such  services.  The  effects  of  these  geo- 
spatial  technologies  on  individual  privacy  have  not  been  widely  discussed, 
even  though  their  potential  threat  is  substantial. 

Introduction 

Though  privacy  is  widely  viewed  as  a  basic  human  right  (Diffie  and 
Landau,  1998),  the  degree  of  privacy  afforded  to  an  individual  varies  across 
space,  among  cultures  and  over  time.  Privacy  in  a  military  barracks,  for 
example,  is  different  than  privacy  in  a  college  dormitory,  or  a  single-family 
detached  dwelling  unit.  Expectations  of  privacy  are  also  affected  significantly 
by  technology  (Agre  and  Rotenberg,  1998).  Most  people  are  aware  that 
telephone  wiretaps  are  now  widely  prohibited,  but  at  the  dawn  of  the 
telephonic  era,  wiretapping  was  not  specifically  forbidden  by  legislation 
(Dash,  Schwartz  and  Knowlton,  1959;  Diffie  and  Landau,  1998).  Recently, 
attention  has  shifted  to  the  practices  of  businesses  that  acquire  information 
about  the  on-line  behavior  of  web-surfers  (Edelstein,  2001;  Waters,  2000). 
In  some  cases  this  information  is  protected  as  a  strategic  asset,  but  in  others 
it  may  be  either  sold  or  transferred  as  a  consequence  of  "dot-com"  business 


19 


Geographic  Information  Technologies  and  Their  Potentially  Erosive  Effects  on  Personal  Privacy 

failures  and  acquisitions.  The  past  decade  has  also  seen  a  steep  increase 
in  identity  theft  incidents  and  crimes  related  to  the  use  of  information 
technologies. 

The  concern  generated  by  reports  of  these  privacy-violating  activities  has 
been  revealed  in  proposed  and  enacted  legislation  (Bennett,  1998)  and  the 
establishment  of  organizations  focused  on  the  preservation  of  privacy  rights 
(EPIC,  2001;  PI,  2001).  What  has  not  been  widely  discussed,  either  by 
these  groups  in  particular  or  social  scientists  in  general,  however,  is  the  way 
that  current  (and  planned)  geographic  information  technologies  can  be  used 
for  individual-level  surveillance.  Some  researchers  have  begun  to  engage 
this  issue,  but  with  rare  exceptions  (Dobson,  1998;  2000)  their  discussions 
about  privacy  require  the  reader  to  make  inductive  leaps  or  fail  to  address  the 
individual-level  effects  of  the  technologies  (Curry,  1997,  1998;  Goss,  1995). 
The  purpose  of  this  paper  is  to  sketch  out  the  role  that  recent  developments  in 
"geo-spatial"  technologies,  such  as  remote  sensing  and  geographic  information 
systems  (GIS),  may  play  in  future  erosions  of  privacy.  A  particular  focus 
is  placed  on  the  increasing  resolution  of  remote  sensing  systems,  and  the 
processes  through  which  existing  geographic  information  can  be  acquired, 
processed,  and  cross-referenced  with  other  on-line  information  sources  to 
reveal  individual-level  characteristics. 

Remote  Sensing  -  An  Unblinking  Eye  in  the  Sky 

Before  the  1970s,  remote  sensing  information,  in  the  form  of  electromag- 
netic radiation  reflected  from  objects  in  the  environment,  was  normally 
collected  in  photographic  form.  Early  remote  sensing  satellites  were  designed 
for  strategic  surveillance  purposes  and  used  photography  to  record  map-like 
imagery  that  was  retrieved  from  space  (Jensen,  2000).  Because  of  the  great 
expense  required  to  place  precision-camera-bearing  satellites  into  orbit, 
running  out  of  film  during  a  time  of  national  crisis  was  problematic.  Digital 
scanning  technology  obviated  such  problems  by  substituting  scanned  pixels 
and  telemetry  for  photographic  film.  In  essence,  bits  were  substituted  for 
atoms  (Negroponte,  1995). 

The  first  civil  remote  sensing  system,  the  Earth  Resources  Technology 
Satellite  (re-named  Landsat),  became  operational  in  1972  with  a  relatively 
crude  ground  resolution  of  approximately  79  meters.  This  means  that  a 
Landsat  image  would  be  constructed  from  thousands  of  79  meter  cells  (called 
picture  elements  or  pixels);  for  the  purpose  of  comparison,  one  Landsat 
pixel  is  larger  than  an  Olympic-sized  (50m)  swimming  pool.  Though  such 
coarse-resolution  images  did  not  appear  to  pose  a  threat  to  individual-level 

20 


Marc  P.  Armstrong 

privacy,  the  image  classification  and  processing  methods  that  were  developed 
to  wrest  every  possible  bit  of  information  from  them  continue  to  be  applicable 
today  (Jensen,  1996).  As  technology  progressed,  the  resolution  of  civil 
remote  sensing  satellites  increased.  France's  Satellite  Pour  1' Observation  de 
la  Terre  (SPOT)  was  placed  into  orbit  in  1986  with  a  maximum  resolution 
of  10m.  In  1988  the  Indian  Remote  Sensing  (IRS)  system  was  launched 
with  a  6-meter  sensor.  Six  meters,  however,  is  coarse  when  compared  to 
current  and  planned  systems. 

In  1999  a  new  satellite,  one  of  several  proposed  by  private  businesses  after 
a  shift  in  U.S.  space  policy,  was  placed  into  orbit.  This  system  (IKONOS)  has 
a  maximum  ground  resolution  of  1  meter  and  has  considerable  implications 
for  strategic  and  individual-level  surveillance.  To  place  the  spatial  resolution 
of  IKONOS  in  context,  approximately  2500  of  its  pixels  would  be  needed  to 
construct  an  image  of  an  Olympic-sized  swimming  pool.  In  fact,  card-table 
sized  objects  can  be  resolved,  provided  there  is  sufficient  contrast  between  the 
target  and  its  surroundings.  Note,  however,  that  features  below  the  resolution 
of  a  sensor  can  be  detected,  again,  when  sufficient  contrast  exists.  This  means 
that  it  is  now  possible  to  count  vehicles  in  the  driveway  of  a  suburban  dwelling 
and  to  make  counts  of  individuals  from  orbit  if  they  are  sufficiently  dispersed 
and  have  sufficient  contrast  (e.g.,  people  on  a  lawn). 

Not  only  are  data  from  these  1 -meter  systems  now  available,  they  are 
the  harbingers  of  even  higher  resolution  systems.  The  U.S.  Department  of 
Commerce  has  recently  licensed  sensors  with  a  spatial  resolution  of  0.5  meters 
(DOC,  2001)  and  at  least  one  commercial  firm  has  indicated  its  intent  to 
place  a  payload  with  such  a  capability  into  orbit  by  2004  (Spacelmaging, 
2001).  This  sensor  will  have  4  times  the  resolution  of  current  1  meter 
systems,  and  considering  that  it  is  possible  to  resolve  sub-pixel  features,  it  will 
certainly  be  possible  to  distinguish  the  characteristics  of  individuals, 
provided  they  are  unusual  in  some  respect.  For  example,  if  a  person 
were  to  wear  a  white  sombrero,  when  observed  from  orbit  they  could  be 
distinguishable  in  a  crowd.  Moreover,  at  this  level  of  spatial  resolution, 
counting  individuals  becomes  a  more  straightforward  activity,  since  this 
level  of  resolution  approximates  "personal  distance"  in  proxemics  analyses 
(Hall,  1959;  Porteous,  1977). 

The  increased  surveillance  capabilities  of  commercial  remote  sensing 
imagery  has  not  gone  without  notice.  In  a  move  that  shocked  the  commercial 
remote  sensing  community,  the  U.S.  Department  of  Commerce,  citing 
Section  1064  of  Public  Law  104-201  (the  1997  Defense  Authorization  Act), 
banned  the  sale  of  images  of  Israel  at  a  resolution  of  less  than  2  meters. 

21 


Geographic  Information  Technologies  and  Their  Potentially  Erosive  Effects  on  Personal  Privacy 

This  level  was  chosen  because  imagery  from  an  unregulated  2  meter  Russian 
system  has  recently  become  available.  Israel  apparently  cited  military  and 
strategic  concerns  in  arguing  for  the  ban.  Similar  security  concerns  exist 
elsewhere,  and  mapped  information  routinely  distributed  in  the  U.S.  (see 
Monmonier,  1996:  118-120)  is  unavailable  in  many  other  countries.  With 
the  increasing  penetration  of  the  Internet,  even  into  developing  countries, 
such  restrictions  are  rapidly  becoming  moot  (see  Petrazini  and  Kibati, 
1999;Agarwal,  1999). 

Inverse  Address  Matching  and  GIS-  We  Know  Where  You  Live 

In  1869,  Dr.  John  Snow  produced  a  map  that  showed  the  location  of 
fatalities  from  a  cholera  outbreak  in  London  (Frerichs,  2001).  After  studying 
this  map,  and  observing  a  cluster  of  deaths,  he  formulated  a  hypothesis  that 
the  outbreak  was  related  to  the  water  supply.  Snow  then  ordered  the  handle 
removed  from  a  water  pump  located  near  the  center  of  the  cluster,  the  deaths 
in  the  area  appeared  to  decrease  as  a  consequence,  and  additional  research  (by 
Snow  and  others)  established  that  cholera  was,  in  fact,  a  water-borne  disease 
(c.f.  Tufte,  1997;  Brody  et  al.,  2000). 

The  map  that  Snow  produced  was  an  early  example  of  "dot  mapping" 
or  "pin  mapping"  that  is  created  from  a  street  network  and  addresses  for 
a  specific  set  of  incidents,  in  his  case  cholera  fatalities.  Other  common 
examples  include  crime  mapping  (e.g.,  of  burglary  locations)  and  retail 
market  analysis  (e.g.,  customer  residences).  The  creation  of  such  maps 
required  considerable  effort  in  the  past,  but  now  they  can  be  made  easily 
using  the  address-matching  capabilities  of  inexpensive  GIS  software  and  street 
network  databases  such  as  the  TIGER  files  created  to  support  US  Census  data 
collection  activities  (Broome  and  Meixler,  1990;  Marx,  1990). 

If  we  consider  a  typical  dot  map,  the  information  depicted  is  often 
thought  to  be  anonymous  (Figure  1):  There  is  no  direct  evidence  provided  to 
identify  individuals  from  the  abstract  symbols  on  the  map  and  it  is  especially 
difficult  to  recover  information  in  cases  where  each  symbol  represents  several 
phenomena.  It  is  a  common  practice,  for  example,  to  produce  population 
distribution  maps  in  which  each  dot,  for  example,  represents  500  persons 
(see  Dent,  1999).  However,  in  epidemiological  and  criminal  investigations 
it  is  much  more  common  to  find  a  one-to-one  correspondence  between 
each  symbol  (a  case)  and  the  phenomenon  it  represents.  What  is  not 
widely  known,  even  by  many  GIS  practitioners,  is  that  it  is  also  a  relatively 
simple  matter  to  recover  addresses  from  a  map  using  a  process  called  inverse 
(or  reverse)  address  matching.    These  recovered  addresses  can  then  be 

22 


Marc  P.  Armstrong 

cross-referenced  with  other  databases  (e.g.,  city  directories)  to  reveal  further 
details  about  personal  identities. 

Figure  1  was  produced  by  selecting  30  individuals  from  a  telephone 
directory.  The  addresses  were  input  into  a  database,  address-matched,  and 
then  mapped  using  a  TIGER  file  and  GIS  software  (ArcView,  version  8.0.2, 
by  ESRI).  In  some  cases,  an  address  cannot  be  linked  to  TIGER  files  because 
of  a  lack  of  agreement  in  the  spelling  of  street  names,  including  prefixes 
and  suffixes.  For  example,  123  NE  Bridge  Street  Ct  is  not  easily  matched 
to  123  Northeast  Bridg  St  Court.  In  other  cases,  new  construction  creates 
streets  (and  addresses)  that  are  not  included  even  in  the  most  recent  TIGER 
file.  Despite  such  problems,  with  current  address-matching  software  and  an 
appropriate  level  of  human  intervention,  it  is  usually  possible  to  match  more 
than  90%  of  the  addresses  in  a  file.  In  the  example  described  here,  1 00%  of 
the  randomly-selected  addresses  were  matched  successfully. 

If  information  is  represented  as  an  address-matched  dot  map,  how  difficult 
is  it  to  invert  the  mapping  process  and  recover  the  original  addresses  that 
were  used  to  produce  the  map?  It  turns  out  that  it  is  quite  easy  to  recover 
an  address  (Figure  2).  But  largely  as  a  consequence  of  factors  related  to  the 
TIGER  files  and  the  address-matching  algorithms  used,  uncertainty  remains 
about  whether  the  address  obtained  is  the  correct  address.  In  fact,  of  the  30 
original  addresses  used  to  produce  Figure  1,  19  (63%)  were  exactly  inverse 
address  matched  using  ArcView.  However,  if  we  loosen  this  restriction 
slightly,  25  (83%)  were  within  one  address  and  29  (97%)  were  located  on 
the  correct  street  segment  (a  block  face  between  intersections).  This  level 
of  local  accuracy  means  that  there  is  a  significant  risk  that  individual-level 
dot  mapped  information  can  be  compromised  to  reveal  addresses,  and  by 
implication,  personal  identities.  Consequently,  individual-level  data  (such 
as  medical  information)  should  not  be  address-matched  and  released  into 
public  view  unless  it  has  been  masked,  for  example,  by  randomly  displacing 
each  symbol  (Armstrong,  Rushton  and  Zimmerman,  1999;  Chakraborty 
and  Armstrong,  2001).  Additional  research  is  needed  to  provide  empirical 
bounds  on  expectations  about  address-match  inversion  success  rates  under 
different  assumptions  about  source  map  scale,  symbolization,  residential 
structure,  and  masking  strategy. 

Location  Based  Services-  Do  You  Want  Fries  With  That? 

Most  adults  in  the  U.S.  allow  information  to  be  published  that  others 
elect  to  hold  back—  their  telephone  listing.  Telephone  directories  are  available 
on-line,  and  can  be  cross-linked  to  other  databases,  making  it  possible, 

23 


Geographic  Information  Technologies  and  Their  Potentially  Erosive  Effects  on  Personal  Privacy 

therefore,  to  enter  a  name,  obtain  a  telephone  number  and  address,  and  then 
use  that  address  to  create  a  map.  This  type  of  cross-referenced  information 
serves  as  the  basis  for  the  E-9 1 1  system  that  has  important  public  health  and 
emergency  service  implications  in  the  U.S.  In  most  localities,  a  call  placed 
to  a  local  911  number  will  enable  emergency  services  to  be  dispatched  to  the 
address  at  which  the  telephone  is  located. 

With  the  proliferation  of  cellular  telephones  in  the  late  1990s,  a  significant 
and  often  life-threatening  problem  was  encountered  with  increasing  frequency. 
Cell  phone  users  called  91 1  with  the  expectation  that  they  would  receive  help. 
The  problem,  of  course,  is  that  cell  phone  numbers  are  not  tied  to  a  specific 
physical  location  (except  as  a  billing  address)  and  when  cell  phone  users  were 
unable  to  provide  useful  information  about  their  current  location,  this  created 
enormous  problems  for  emergency  service  providers.  As  a  consequence,  the 
Federal  Communications  Commission  has  stipulated  that,  effective  in  late 
2001,  the  location  of  an  activated  cell  phone  handset  must  be  able  to  be 
determined  to  within  50  meters  for  67%  of  calls  and  150  meters  for  95%  of 
calls  (FCC,  2000).  Several  approaches  have  been  considered  to  accomplish 
this  task  though  two  have  gained  the  most  support:  triangulation  of  cell  phone 
transmissions  based  on  signal  strength  and  direction,  and  the  installation  of 
small  GPS  (Global  Positioning  System)  receivers  in  each  cell  phone  (Hein, 
et  ai,  2001).  Because  of  an  executive  order  that  took  effect  in  May  2000, 
typical  GPS  receivers  are  now  able  to  provide  an  increased  level  of  coordinate 
accuracy  (NOAA,  2001);  this  ability,  coupled  with  rapid  price  drops  in 
increasingly  compact  GPS  receivers,  provides  considerable  power  to  a  new 
generation  of  location-based  services. 

Location-based  services  are  used  with  wireless  communication  devices 
to  provide  information  about  the  local  context  of  a  mobile  user.  For 
example,  if  a  user  were  in  an  unfamiliar  city,  it  would  be  possible  to  receive 
information  about,  for  example,  the  direction,  distance,  and  route  to  all 
Chinese  restaurants  (if  any)  within  1  km  of  their  current  location.  Moreover, 
when  linked  to  other  databases  it  would  also  be  possible  to  not  only  view  a 
menu,  but  also  a  list  of  lunch  (or  dinner)  specials  that  might  be  available. 
Golledge  et  al.  (1998)  have  described  how  a  variation  on  this  technology  can 
be  used  to  provide  geographic  information  to  visually-impaired  travelers. 
Of  course,  individuals  would  have  to  "opt  in"  to  receive  these  types  of 
services,  but  the  potential  for  service-providers  to  collect  information  about 
individual-level  spatial  behavior  is  substantial  (Dobson,  2000).  Moreover, 
the  potential  abuse  of  such  technology  by  police  has  yet  to  be  addressed  by 
scholars  and  civil  libertarians. 

24 


Marc  P.  Armstrong 

Concluding  Discussion 

Increasing  numbers  of  people  are  becoming  integrated  into  the  densifying 
global  web  of  wired  and  wireless  communication  and  information  technolo- 
gies. Digitally  encoded  information  about  their  real  and  virtual  activities 
will  be  collected  and  used,  possibly  for  nefarious  purposes.  In  this  paper  my 
goal  has  been  to  elucidate  some  of  the  increasingly  significant  impacts  that 
geo-spatial  technologies  will  have  on  the  surveillance  of  day-to-day  activities, 
as  well  as  the  follow-on  effects  that  will  be  observed  with  respect  to  our 
technologically-mediated,  and  inevitably  fluid,  notions  about  privacy. 

Remote  sensing,  long  the  provenance  of  government  agencies,  is  now  a  big 
business  and  competition  is  spurring  improvements  in  service.  In  the  near 
future,  companies  will  be  able  to  provide  images  with  what  1 0  years  ago  would 
have  been  almost  unthinkable  levels  of  fidelity.  Though  such  imagery  only 
reveals  objects  as  they  are  viewed  from  orbit,  it  may  reveal  more  than  we  might 
wish  and  access  to  it  will  be  available  to  all  who  can  afford  it. 

GIS  is  also  a  multi-billion  dollar  a  year  industry  and  as  it  penetrates  into 
additional  market  segments,  cost-of-use  will  continue  to  decrease  rapidly. 
There  is,  however,  only  a  nascent  concern  amongst  current  researchers  about 
the  personal  privacy  intrusion  aspects  of  this  technology;  there  is,  for  example, 
no  research  literature  about  inverse-address-matching.  Location-based 
services  are,  in  a  very  real  sense,  an  elaboration  on  the  theme  of  inverse 
address  matching.  These  new  services  exist  in  the  rapidly  growing  high 
technology  nexus  that  integrates  GIS,  wireless  computing  and  cellular 
telephones.  The  coming  decade  will  see  substantial  growth  in  these  as 
yet  unregulated  location-based  services,  especially  as  third-generation  cell 
phones  with  improved  graphics  capabilities  become  commonplace.  The 
social  science  implications  of  these  new  geo-spatial  technologies  have  yet 
to  be  addressed  in  a  comprehensive  fashion  and  the  societal  impacts  of 
emergent  fusions  of  these  technologies  requires  further  theoretical  and 
empirical  investigation. 

References 

Agarwal,  P.K.  1999.  "Building  India's  National  Internet  Backbone."   Communica- 
tions of the  Association  for  Computing  Machinery  42  (6):  53-58. 

Agre,  RE.  and  M.  Rotenberg.  1998.  Technology  and  Privacy:  The  New  Landscape. 
Cambridge,  MA:  The  MIT  Press. 

Armstrong,  M.P.,  G.  Rushton,  and  D.L.  Zimmerman.  1999.  "Geographically 
Masking  Health  Data  to  Preserve  Confidentiality."  Statistics  in  Medicine  18  (5): 
497-525. 

25 


Geographic  Information  Technologies  and  Their  Potentially  Erosive  Effects  on  Personal  Privacy 

Bennett,  C.J.  1998.  "Convergence  Revisited:  Toward  a  Global  Policy  for  the  Protec- 
tion of  Personal  Data."  In  Technology  and  Privacy:  The  New  Landscape,  ed.  P.E. 
Agre  and  M.  Rotenberg.  Cambridge,  MA:  The  MIT  Press,  pp.  99-123. 

Brody,  H.,  M.  Rip,  P.  Vinten-Johansen,  N.  Paneth,  and  S.  Rachman.  2000.  "Map- 
making  and  Myth-making  in  Broad  Street:  the  London  Cholera  Epidemic, 
1854."  The  Lancet  (356):  64  -  68. 

Broome,  F.R.  and  D.B.  Meixler.  1990.  "The  TIGER  Data  Base  Structure."   Cartog- 
raphy and  Geographic  Information  Systems  17  (1):  39-48. 

Chakraborty,  J.  and  M.P  Armstrong.  2001.  "Assessing  the  Impact  of  Airborne  Toxic 
Releases  on  Populations  with  Special  Needs."  The  Professional  Geographer  53 
(1):  119-131. 

Curry,  M.R.  1997.  "The  Digital  Individual  and  the  Private  Realm."  Annals  of  the 
Association  of  American  Geographers  87  (4):  681-699. 

Curry,  M.R.  1998.  Digital  Places:  Living  with  Geographic  Information  Technologies. 
New  York,  NY:  Routledge. 

Dash,  S.,  R.E  Schwartz,  and  R.E.  Knowlton.  1959.  The  Eavesdroppers.  New 
Brunswick,  NJ:  Rutgers  University  Press. 

Dent,  B.D.  1999.  Cartography:  Thematic  Map  Design.  Dubuque,  LA:  WCB  McGraw 
Hill. 

Diffie,  W.  and  S.  Landau.  1998.  Privacy  on  the  Line:  The  Politics  of  Wiretapping  and 
Encryption.  Cambridge,  MA:  The  MIT  Press. 

Dobson,  J.  1998.  "Is  GIS  a  Privacy  Threat?"  GeoWorld,  May. 
http://www.geoplace.com/gw/ 1 998/0798/798onln.asp 

Dobson,  J.  2000.  "What  Are  the  Ethical  Limits  of  GIS?"  GeoWorld,  May. 
http://www.geoplace.com/gw/2000/0500/0500g.asp 

DOC,  2001.  US  Department  of  Commerce,  National  Oceanic  and  Atmospheric 
Administration,  http://www.licensing.noaa.gov/faqs.htm 

Edelstein,  HA.  2001.  "Pan  for  Gold  in  the  Clickstream."  InformationWeek  (sic) 
Issue  828,  March  12,  2001,  pp.  77-91. 

EPIC,  2001.  http://www.epic.org 

FCC,  2000.   Federal  Communications  Commission,  OET  Bulletin  Number  71, 
April  12,  2000.  http://www.fcc.gov/oet/info/documents/bulletins/ 

Frerichs,  R.  2001.   http://www.ph.ucla.edu/epi/snow.html 
Golledge,  R.G.,  R.A.  Klatzky,  J.M.  Loomis,  J.  Speigle,  and  J.  Tietz.  1998.  "A 

Geographical  Information  System  for  a  GPS  Based  Personal  Guidance  System." 
International  Journal  of  Geographical  Information  Science  12  (7):  727-749. 


26 


Marc  P.  Armstrong 

Goss,  J.  1995.  "We  Know  Who  You  Are  and  We  Know  Where  You  Live:  The 

Instrumental  Rationality  of  Geodemographic  Systems."  Economic  Geography  71 
(2):  171-198. 

Hall,  C.T.  1959.  The  Silent  Language.  Garden  City,  NJ:  Doubleday. 

Hein,  G.W,  B.  Eissfeller,  J.O.  Winkel  and  V.  Oehler.  2001.  "Determining  Location 
Using  Wireless  Networks."  GPS  World  12  (3):  26-37. 

Jensen,  J.R.  2000.  Remote  Sensing  of  the  Environment:  An  Earth  Resource  Perspective. 
Upper  Saddle  River,  NJ:  Prentice  Hall. 

Jensen,  J.R.  1996.  Introductory  digital  image  processing:  a  remote  sensing  perspective. 
Upper  Saddle  River,  NJ:  Prentice  Hall. 

Marx,  R.W  1990.  "The  TIGER  System:  Yesterday,  Today  and  Tomorrow."  Cartog- 
raphy and  Geographic  Information  Systems  17  (1):  89-97. 

Monmonier,  M.  1996.  How  to  Lie  with  Maps  (2nd  ed).  Chicago,  IL:  University  of 
Chicago  Press. 

Negroponte,  N.  1995.  Being  Digital.  New  York,  NY:  Knopf. 

NOAA,  2001.  http://www.ngs.noaa.gov/FGCS/info/sans  SA/docs/statement.html 

Petrazinni,  B.  and  M.  Kibati.  1999.  "The  Internet  in  Developing  Countries." 

Communications  of  the  Association  for  Computing  Machinery  42  (6):  31-36. 

PI,  2001.  www. privacyinternational .org 

Porteous,  J.D.  1977.  Environment  &  Behavior:  Planning  and  Everyday  Urban  Life. 
Reading,  MA:  Addison- Wesley. 

Spacelmaging,2001. http://www.spaceimaging.com/newsroom/releases/ 
200 1  /halfmeter_license.htm 

Tufte,  E.  1997.  Visual  Explanations:  Images  and  Quantities,  Evidence  and  Narrative. 
Cheshire,  CT:  Graphics  Press. 

Waters,  N.  2000.  "GIS  and  the  Bitter  Fruit:  Privacy  Issues  in  the  Age  of  the  Inter- 
net." GeoWorld,  May.  http://www.geoplace.com/gw/2000/0500/0500edg.asp 


27 


Geographic  Information  Technologies  and  Their  Potentially  Erosive  Effects  on  Personal  Privacy 


Figure  1 .  Locations  for  Thirty  Randomly-Selected  Address  in  Iowa  City,  IA 


A 


Enlarged  Portion  of  Figure  1  Showing  Addresses  Obtained  by  Inverse  Address  Matching 


40    0    40  80  Meters 


28 


To  Promote  the  General  Welfare  -  the  Ethical 
Imperative  of  Closing  the  Digital  Divide 

Valerie  L.  Patterson 
Florida  International  University 

We  the  People  of  the  United  States,  in  order  to  form  a  more  perfect  Union, 
establish  Justice,  insure  domestic  Tranquility,  provide  for  the  common 
defense,  promote  the  general  Welfare,  and  secure  the  blessings  of  Liberty 
to  ourselves  and  our  Posterity,  do  ordain  and  establish  this  Constitution 
for  the  United  States  of  America. 

Technology  has  a  tremendous  hold  on  the  lives  of  many  Americans  - 
some  would  probably  call  it  a  "strangle-hold."  For  academics,  advances 
and  innovations  in  technology  now  make  it  possible  to  collect  more  data, 
crunch  it  more  easily,  publish  it  more  rapidly  and  disseminate  it  to  more 
individuals  around  the  globe.  Gone  are  the  days  of  a  delayed  response. 
Bulletin  boards  are  created  in  conjunction  with  symposia,  and  there  is  no 
delay  in  your  determining  whether  your  arguments,  hypotheses,  propositions 
are  recommendations  are  theoretically  suspect,  your  colleagues  in  the  academy, 
thanks  to  technology  have  the  capability  to  inform  you  of  your  flawed 
logic,  practically  instantaneously.  Individually,  as  scholars,  along  with  these 
rapid  advancements  and  innovations  has  come  a  realization  that  unless  we 
become  more  technologically  savvy,  that  is  -  able  to  cut,  paste,  scan  and 
deliver,  animate  our  lectures  with  sound  and  up-to-the-minute  information, 
and  deliver  our  courses  to  new  customers  who  just  don't  have  the  time  to 
physically  present  themselves  on  campus,  in  a  web-based  environment  - 
that  we  run  the  risk  of  obsolescence,  that  as  "Boomers"  delivering  instruction 
to  "GenXers,"  our  mindsets  must  change,  we  must  "get  with  the  program" 
or  be  left  behind. 

We  could  say  that  technology,  specifically  information  and  communication 
technology,  offers  tremendous  opportunity  for  the  social  sciences,  particularly 
in  the  areas  of  research,  scholarship,  and  dissemination.  However,  advances 
in  technology  have  also  raised  questions  of  an  ethical  nature,  related  to  who 
has  access  and  who  ultimately  benefits. 


29 


To  Promote  the  General  Welfare  -  the  Ethical  Imperative  of  Closing  the  Digital  Divide 

If  you  are  teaching  at  a  Carnegie  designated  Research  I  Institution,  the 
probabilities  of  your  having  access  are  pretty  good.  But  what  about  your 
students,  or  your  potential  students,  or  their  parents,  or  the  grandmothers 
of  your  students,  or  the  disabled  or  members  of  disadvantaged  populations? 
Advances  in  technology  have  allowed  scholars  an  opportunity  to  access 
information  on  a  myriad  subjects.  But  the  question  of  access,  who  has  it,  and 
who  doesn't  is  an  issue  that  bears  consideration  and  review. 

The  purpose  of  this  paper  is  to  carefully  examine  one  aspect  of  information 
technology  related  to  access  -  the  existence  of  what  is  frequently  referred 
to  as  the  "digital  divide."  I  believe  that  as  scholars  and  researchers,  we 
have  to  look  beyond  immediate  and  individual  benefits  and  also  consider 
community,  nation,  and  world. 

Technology  can  enhance  a  person's  existence,  in  becoming  "connected" 
the  world  becomes  a  much  smaller  place.  Baggio  (2001)  suggests  that  digital 
contact  can  bridge  social  and  physical  frontiers  allowing  distant  communities 
to  share  the  same  reality.  For  others,  its  absence  can  make  the  world  less 
accessible,  and  much  more  difficult  to  navigate.  Knowledge  is  power.  But 
rapid  changes  in  technology,  for  example  going  from  a  486  to  a  Pentium 
suggests  that  everyone  is  not  going  to  be  on  the  same  page  at  the  same  time. 
There  are  some  basics,  that  can  be  provided  that  can  give  everyone  some 
entry  point,  however  what  should  be  done  if  barriers  related  to  race,  gender, 
poverty,  disability  or  infrastructure  exist?  Other  scholars  (Kodama,  2001  for 
example)  suggest  that  the  essence  of  information  technology  lies  in  its  ability 
to  broaden  the  range  and  possibilities  of  human  activity.  Economically,  if 
your  circumstances  preclude  you  from  traveling  the  globe,  might  you  derive 
satisfaction  from  a  "virtual  tour?" 

My  thesis  is  as  follows:  Removing  the  barriers  that  prevent  access  to 
technology,  specifically  communication  and  information  technology  should 
be  a  governmental  priority.  My  argument  is  based  on  the  belief  that  this  is 
an  ethical  imperative.  Just  as  government  is  responsible  for  ensuring  that  we 
are  safe  from  air  pollution,  safe  from  the  invasion  of  our  enemies  —  so  too  is 
the  responsibility  for  ensuring  that  there  is  access  for  all  -  to  technology.  That 
is,  when  we  argue  that  government  should  do  what  is  in  the  public's  best 
interest,  removing  these  barriers  falls  within  this  realm. 

Constitutional  Implications 

The  Preamble  to  the  Constitution  suggests  that  its  existence  is  as  the 
result  of  a  desire  to  promote  the  general  Welfare.  So  examining  this  notion 
of  technology  and  access,  from  a  philosophical  perspective  I  turn  to  this 

30 


Valerie  L.  Patterson 

document  to  lay  the  foundation  for  my  thesis.  It  is  a  document  that  serves 
as  the  foundation  for  all  decisions  and  policy  making  that  impacts  the  lives 
of  all  Americans.  Rosenbloom,  Carroll  and  Carroll  (2000)  argue  that  it  is 
a  "document  written  in  1787  that  still  governs  a  complex  nation  such  as 

the  United  States  and  must  be  both  flexible  and  brilliant And  that  its 

flexibility  allows  it  to  accommodate  vast  social,  economic,  intellectual, 
and  technological  change."  So  the  Constitution  through  the  application  of 
formal  and  informal  methods  of  amendment  has  evolved  to  allow  for  and 
address  social,  cultural  and  most  significantly,  technological  change  and  I  am 
suggesting  that  removing  barriers  to  facilitate  access  should  be  considered 
promoting  the  general  welfare.  I  believe  that  this  proposition  is  a  valid  one  in 
light  of  the  rhetoric  associated  with  governments'  desires  for  the  social  well- 
being  of  its  citizens.  For  example  the  presidents  and  prime  ministers  of  the 
G8  assert  that  information  technology  provides  enormous  opportunities  to  be 
seized  and  shared  by  all  (Presidents  &  Prime  Ministers,  2000) . 

Social  science  has  been  and  continues  to  be  a  vehicle  for  examining  the 
problems  and  ills  of  society.  Social  science  research  and  inquiry  has  allowed 
scholars  to  examine  issues  related  to  economic  disparity,  poverty  and  race. 
The  digital  revolution,  as  mentioned  in  the  introduction  of  this  paper,  has 
facilitated  the  capability  of  the  scholar  to  collect,  review,  evaluate  and  analyze 
information,  ultimately  building  new  knowledge.  Again,  knowledge  is  power 
and  this  revolution  has  also  made  it  abundantly  clear  that  everyone  isn't  riding 
this  wave  and  that  something  should  be  done  about  this  fact. 

The  Divide 

Much  has  been  written  about  the  "digital  divide."  It  can  be  defined 
as  the  gap  between  the  information  rich  and  the  information  poor  that 
exists  because  of  inadequate  access  to  technology  that  facilitates  access  to 
information.  This  could  be  as  simple  as  a  telephone,  analog  versus  digital, 
or  it  could  be  as  complex  as  knowing  the  best  buy  between  a  1 .3  GHz  Intel 
Pentium  4  or  a  1.0  GHz  AMD  Athlon. 

The  use  of  technology  in  its  various  forms  has  numerous  and  multiple 
implications.  The  Social  Science  Research  Council's  website  (www.ssrc.org/ 
programs)  argues  that  the  rapid  introduction  of  technology  that  has  been 
witnessed  in  the  last  two  decades  (is)  designed  to  aid  progress,  but  that  to 
date  no  body  of  language  exists  to  guide  decisions  inspired  by  or  that  bear 
directly  on  information  technology. 

In  2001  inquiring  minds  can  revisit  the  idea  of  promoting  the  general 
welfare  and  wonder  if  providing  access  to  technology,  specifically  information 

31 


To  Promote  the  General  Welfare  -  the  Ethical  Imperative  of  Closing  the  Digital  Divide 

technology  to  those  who  are  disadvantaged  is  what  the  Founding  Fathers 
envisioned. 

In  his  final  State  of  the  Union  address,  Bill  Clinton  said  the  following, 
"Opportunity  for  all  requires  having  access  to  a  computer  and  knowing 
how  to  use  it.  That  means  we  must  close  the  'digital  divide'  between  those 
who've  got  the  tools  and  those  who  don't"  (Goldsborough  2000),  this 
suggests  that  the  access  equals  opportunity  which  equals  a  competitive 
advantage  for  all  Americans. 

But  is  the  divide  related  to  race,  income,  ethnicity,  and/or  gender?  In 
reference  to  women  and  the  divide,  Marcia  Ann  Gillespie  (editor-in-chief 
of  Ms.  Magazine)  responding  to  an  Inc.  Magazine  interview  says,  "If  you 
asked  me  four  years  ago  whether  the  culture  of  technology  is  good  or  bad  for 
women,  I  would  have  said  that  maybe  it's  not  a  good  thing.  It  is  so  incredibly 
male-centered.  But  more  and  more  women  are  embracing  the  new  media 
and  technology"  {Inc.,  2000). 

So  the  question  becomes  one  centered  around  impact  and  outcome.  If  the 
literature  abounds  with  research  suggesting  that  the  corporate/organizational 
playing  field  is  not  level  (see  Fernandez,  1999  for  example),  that  women  face 
something  termed  the  "glass  ceiling,"  will  access  to,  understanding  of,  and 
ability  to  utilize  and  manipulate  the  new  media  and  information  technology 
enhance  and  improve  the  opportunities  for  women? 

Gillespie  (2000)  also  observes  that  "the  most  disturbing  and  insidious  part 
of  the  new  technological  age  is  that  there  is  no  discussion  of  how  technology 
can  be  used  for  the  greater  good"  -  you  know  to,  as  I  have  suggested, 
'promote  the  general  welfare.' 

So  social  science  research  probably  allows  us  or  at  least  compels  scholars 
to  ask  —  who  benefits  and  who  pays?  Does  the  rising  tide  of  technology 
"float  all  ships?"  If  it  does  my  thesis  is  supported.  Or  in  our  rush  to 
technological  supremacy  are  we  leaving  those  behind  whose  income,  race, 
ethnicity,  disabilities  and  gender  present  barriers  and  challenges.  And  if 
we  are  —  does  it  matter? 

As  scholars  engaged  in  social  science  research,  an  examination  of 
information  technology  requires  an  assessment  of  this  fundamental  concern, 
this  assessment  requires  us  to  examine  the  rhetoric  focusing  on  the  "digital 
divide"  to  determine  if  it  is  instigated  by  some  fundamental  assertion/belief 
that  access  and  use  will  somehow  benefit  the  commons. 


32 


Valerie  L.  Patterson 

Presidential  Support 

An  examination  of  the  Clinton  record  suggests  that  he  was  committed  to 
closing  the  gap.  In  July  1 999,  Clinton  proposed  a  multi-billion-dollar  program 
to  help  bridge  the  digital  divide  to  ultimately  provide  access  for  all  Americans 
(Rosenthal,  2000).  This  included  an  initiative  to  promote  innovative 
applications  of  information  technology  for  underserved  communities 
tripling  the  Department  of  Commerce's  Technology  Opportunities  Program. 
Interestingly  enough,  post  Bill  Clinton,  the  current  administration  does 
not  appear  to  be  as  committed  to  bridging  the  divide.  Some  observers  are 
quick  to  point  to  the  comments  made  by  Michael  Powell,  in  his  first  news 
conference  as  chair  of  the  Federal  Communication  Commission.  Powell 
skeptical  about  the  FCC's  role  in  closing  the  divide,  suggested  that  the  ability 
of  some  individuals  to  be  the  first  to  purchase  and  use  cutting  edge  technology 
doesn't  suggest  that  there  is  a  divide,  going  on  to  say  "I  think  there  is  a 
Mercedes  divide.  I'd  like  to  have  one"  (Flagg,  2001). 

The  Republicans  oppose  the  broader  brush  response  to  disparities  and 
favor  funding  those  long-standing  programs  that  have  more  specific  mandates 
(Ross  2001),  although  Fred  Lipton,  a  leading  Republican  objected  to  the 
reduction  in  the  Technology  Opportunities  Program  budget.  Plus  given 
the  Republican  emphasis  on  "less  government"  I  would  argue  that  it  is 
highly  unlikely  that  philosophically  and  ideologically  my  argument  would 
find  consensus  and  support. 

Falling  Through  the  Net 

This  difference  in  perspectives  has  led  to  a  proposed  reduction  in  the 
Technology  Opportunities  Program  from  42  to  15  million,  even  though  the 
Department  of  Commerce's  Falling  Through  the  Net  document  suggests  that 
the  digital  divide  is  "now  one  of  America's  leading  economic  and  civil  rights 
issues  (Department  of  Commerce,  1999). 

The  Executive  Summary  of  this  report,  argues  that  "information  tools, 
such  as  the  personal  computer  and  the  Internet  are  increasingly  critical  to 
economic  success  and  personal  achievement." 

Two  of  the  most  significant  findings  from  the  report  relevant  to  an 
exploration  of  the  ethical  imperative  are  as  follows: 

•  Whites  are  more  likely  to  have  access  to  the  Internet  from  home  than 
Blacks  or  Hispanics  have  in  any  other  location. 

•  Regardless  of  income  level,  Americans  living  in  rural  areas  are  lagging 
behind  in  Internet  access  and  even  at  the  lowest  income  levels,  those  in 


33 


To  Promote  the  General  Welfare  -  the  Ethical  Imperative  of  Closing  the  Digital  Divide 

urban  areas  are  more  than  twice  as  likely  to  have  Internet  access  than 
those  earning  some  income  in  rural  areas. 
Promoting  the  general  welfare  suggests  to  me  that  it  is  equally  as  important 
for  those  in  rural  areas  as  well  as  urban  areas  to  reap  the  benefits  associated 
with  access  to  information  technology,  that  differences  in  gender  should  have 
no  bearing,  that  differences  in  ethnicity  should  not  dictate  who  has  access  to 
information  and  ultimately  knowledge. 

The  report  also  indicated  that  in  many  instances  the  divide  has  widened. 

The  Digital  Economy 

Dusen  Wishard  (2000)  submits  that  the  Internet  is  redefining  basic 
economic  activity  with  a  projected  forecast  by  Forrester  Research  of 
business-to-business  e-commerce  expected  to  grow  from  $43  billion  to 
$1.3  trillion. 

For  those  families  in  America  with  annual  household  incomes  of  $75,000 
it  can  be  assumed  that  they  are  major  participants  in  this  commerce,  but 
can  the  same  be  said  for  lower  income  urban  families  or  households  in 
rural  unconnected  areas? 

Theirer  (2000),  on  the  other  hand  argues  that  there  is  no  divide  -  that 
given  the  age  of  the  "free  PC,"  and  given  the  results  of  a  survey  that  suggests 
that  97.3%  of  all  poor  households  own  a  television  set,  it  can  be  inferred 
then,  if  household  access  doesn't  exist,  it's  because  people  are  not  interested 
in  having  access.  He  also  argues  that  low-income  households  are  now  seen 
by  computer  firms  as  the  most  popular  segment  of  the  market  to  target. 
He  raises  some  interesting  points,  however,  access  to  a  computer  does 
not  automatically  create  access  to  the  Internet  and  issues  such  as  existing 
infrastructure  bear  consideration. 

Knowing  use  patterns,  and  potential  use  patterns  is  useful.  Research 
suggests  that  there  are  differences  in  use  based  on  race,  ethnicity,  and  gender. 
For  example,  while  there  are  similarities  in  use  for  whites  and  African 
Americans,  African  Americans  are  more  likely  than  whites  to  have  used  the 
technology  for  those  activities  related  to  economic  advancement  and  quality 
of  life,  job  and  housing  searches,  and  to  also  search  for  religious  and  spiritual 
material  (The  Other  Side,  2001). 

This  pattern  of  use  suggests  that  increasing  access  is  useful  for  eliminating 
economic  disparities. 

Electronic  Government  and  Virtual  Communities 

The  move  to  create  virtual  communities,  or  virtual  town  halls,  may 
be  one  argument  for  the  need  for  access.  Some  analysts  argue  that  access 

34 


Valerie  L.  Patterson 

to  the  Internet  will  become  more  necessary  for  full  participation  in  the 
democratic  process. 

Access  to  e-government  can  facilitate  the  delivery  of  services  -  for 
example,  paying  taxes  on  line,  downloading  government  documents,  or 
securing  permits.  Tremendous  implications  exist  for  those  individuals  who 
have  difficulties  navigating  bureaucracies,  those  who  are  intimidated  by 
bureaucracies  or  just  those  who  are  far  removed  from  central  government 
structures. 

The  city  of  San  Carlos,  California  serves  as  an  example  of  the  possibilities. 
This  city  has  established  a  working  relationship  with  Microsoft  and 
participates  in  the  California  State  Select  Agreement  (Public  Management, 
2000).  The  city  is  currently  involved  in  a  project  where  through  the  use  of 
technology  -  city  services  can  be  available  to  citizens  twenty-four  hours  a 
day  and  seven  days  a  week.  So  the  creation  of  a  "virtual  city  hall"  is  believed 
to  be  a  mechanism  for  improving  the  relationship  between  government 
and  the  citizenry. 

Neuborne  (2001)  reminds  us  that  certain  groups  historically  have  been 
excluded  from  full  participation  in  the  electoral  process,  and  he  offers  the 
possibility  of  Internet  voting  as  one  of  several  remedies  to  the  fiasco  of  the 
2000  Presidential  election.  He  cautions,  however,  that  any  discussion  of 
advanced  voting  technology  must  consider  the  impact  of  these  kinds  of 
methods  on  the  electoral  divide  that  separates  the  rich  and  poor. 

E-government  has  been  touted  as  a  mechanism  for  providing  increased 
access  for  citizens  but  given  the  current  disparities  and  inequities  related 
to  access,  how  can  electronic  government  truly  increase  access  for  all 
citizens? 

Baggio  (2001)  argues  that  new  technologies  offer  an  unprecedented  tool 
for  social  mobilization  for  the  less  privileged.  He  suggests  that  the  challenge 
is  to  reduce  what  he  refers  to  as  the  "digital  apartheid"  of  underprivileged 
communities.  Kodama  (2000)  presents  case  study  research  of  the  installation 
of  a  multimedia  village  project  in  Katsuraomura,  Japan,  to  raise  the 
information  and  knowledge  levels  of  individual  residents  and  found  that 
the  use  of  video  terminals  and  digital  networks  will  be  integral  to  creating 
new,  virtual,  regional  communities.  Longstreth  (2001)  discussed  the  benefits 
derived  from  the  use  of  "little  intelligence  communities"  LINCOS,  with 
the  utilization  of  mobile  digital  community  centers  in  recycled  shipping 
containers.  These  containers  were  deployed  to  Costa  Rica  and  have  been 
instrumental  in  creating  opportunities  for  groups  such  as  in  the  case  of  Costa 
Rica,  coffee  growers  who  took  advantage  of  the  opportunity  to  scan  the 

35 


To  Promote  the  General  Welfare  -  the  Ethical  Imperative  of  Closing  the  Digital  Divide 

Internet  for  information  on  prices  and  weather.  Both  the  Japanese  and  Costa 
Rican  examples  illustrate  existing  capabilities  that  can  be  utilized  to  benefit 
social  and  economical  needs. 

Although  proponents  argue  that  this  increased  access  to  government  can 
only  lead  to  positive  results,  some  question  whether  technology  is  changing 
democracy  in  ways  that  make  it  less  democratic  {National  Civic  Review, 
2000).  The  removal  of  barriers  suggests  that  disadvantaged  populations  could 
have  greater  access  to  government  information. 

A  discussion  of  the  potential  for  virtual  communities  is  also  relevant.  One 
question  that  arises  is  whether  the  use  of  information  technology  assists  in 
improving  communication  between  groups/individuals  who  are  different. 
Benschoten  (2000)  argues  that  one  major  benefit  of  on-line  communicating 
is  that  disenfranchised  groups  have  been  allowed  to  participate  in  discussions 
that  they  otherwise  might  have  been  excluded  from.  However,  the  anonymity 
and  distance  that  presents  itself  in  electronic  communication  makes  it  possible 
for  communication  to  become  more  aggressive,  less  civil,  more  hostile  and 
more  challenging  than  face-to-face  communication.  So  frequently  on-line 
discussions,  via  chat-rooms  or  community  bulletin  boards  may  reveal  the 
presence  of  prejudices,  racist  ideologies,  and  stereotypical  beliefs. 

This  evidence  of  decreasing  rather  than  increasing  tolerance,  is  related  to 
a  concern  raised  by  Benschoten  (2000)  that  the  absence  of  body  language 
and  tonal  differentiation  in  on-line  communication,  will  lead  to  more 
misunderstanding  between  people. 

Dusen  Wishard  (2000)  also  argues  that  the  information  environment 
in  which  the  individual  lives  is  being  radically  altered,  that  this  ability  and 
capability  of  speed  in  transmitting  information,  ideas,  and  images  does  not 
allow  for  making  adjustments.  He  suggests  that  rapid  access  to  information 
does  not  provide  time  to  shape  this  information  into  coherent  meaning, 
contributing  to  what  he  calls  a  "certain  psychic  disorientation." 

So  increased  access  and  elimination  of  barriers  could  result  in  less 
willingness  for  shared  space,  contributing  to  decreased  rather  than  increased 
understanding. 

Conclusion 

The  Social  Science  Research  Council  has  established  the  Program  on 
Information  Technology  International  Cooperation  and  Global  Security 
to  nurture  the  development  of  social  science  research  on  information 
technology. 

It  is  clear  that  while  advancements  in  technology  have  allowed  social 

36 


Valerie  L.  Patterson 

scientists  to  improve  the  collection,  analysis  and  evaluation  of  data,  these 
advancements  also  have  the  potential  to  create  dysfunction  and  increase 
disparities  that  exist  among  certain  disadvantaged  populations. 

Much  more  emphasis  is  needed  on  issues  related  to  the  ethical  implications 
associated  with  access  for  all.  The  "rising  tide"  analogy  warrants  restating  at 
this  point.  Shouldn't  there  be  a  compelling  interest  in  ensuring  that  everyone 
has  equal  access  to  information  technology?  I  think  that  there  should  be.  The 
presidents  and  prime  ministers  of  the  G-8  assert: 

"To  this  end  we  must  ensure  that  IT  (information  technology) 
serves  the  mutually  supportive  goals  of  creating  sustainable 
economic  growth,  enhancing  the  public  welfare,  and  fostering 
social  cohesion,  and  work  to  fully  realize  its  potential  to 
strengthen  democracy,  increase  transparency  and  accountability 
in  governance,  promote  human  rights,  enhance  cultural  diversity, 
and  foster  international  peace  and  stability"  (G-8's  Information 
and  Technology  Commitment,  2000). 
This  vision  for  the  opportunities  to  be  reaped  from  information  technology 
as  well  as  a  commitment  to  its  capabilities  to  enhance  the  public  welfare 
support  my  thesis.  This  paper  has  presented  several  areas  that  bear  increased 
attention  and  examination.  It  is  hoped  that  questions  raised  are  thoughtful 
enough  and  provocative  enough  to  move  inquiring  minds  to  action. 

References 

Baggio,  Rodrigo.  2001.  "The  Real  Digital  Revolution:  Putting  computers  in  the 
hands  of  the  powerless  will  change  the  world."  Time  International  157:  60. 

Benschoten,  Elizabeth  V.  2000.  "Technology,  Democracy,  and  the  Creation  of 
Community."  National  Civic  Review  89:  185. 

Dusen  Wishard,  Wm.  Van.  2000.  "The  Beginning  of  a  New  Time."  Vital  Speeches 
66:  349. 

Fernandez,  John  P.  1999.  Race,  Gender  &  Rhetoric.  New  York:  McGraw-Hill. 

Goldsborough,  Reid.  2000.  "Bridging  the  Digital  Divide."  Office  Solutions  17:  11. 

Kodama,  Mitsuru.  2001.  "New  Regional  Community  Creation,  Medical  and  Edu- 
cational Applications."  Systems  Research  and  Behavioral  Science  18:  225. 

Longstreth,  Andrew.  2001.  "The  Littlest  Mobile  Office  -  LINCOS  telecenters  cross 
the  digital  divide,  worldwide."  Ziff  Davis  Smart  Business  for  the  New  Economy 
44. 

Neuborne,  Burt.  2001.  "Reclaiming  Democracy."  The  American  Prospect  12:  18. 


37 


To  Promote  the  General  Welfare  -  the  Ethical  Imperative  of  Closing  the  Digital  Divide 

Rosenbloom,  David,  James  D.  Carroll,  and  Jonathan  D.  Carroll.  2000.  Constitu- 
tional Competence  for  Public  Managers.  Itasca,  111.:  Peacock  Publishing. 

Rosenthal,  Ilene.  2000.  "The  Clinton-Gore  Digital  Divide  Proposal."  Technology 
and  Learning  20:  10. 

Ross,  Patrick  2001.  "Hill  leader  fights  for  digital-divide  funds."  CNET  News.com. 
February  15. 

Social  Science  Research  Council.  2001.  "Information  Technology,  International 
Cooperation  and  Global  Security."  http://www.ssrc.org/programs/ 
programpage.cgi?90174AB05. 

Thierer,  Adam  D.  2000.  "Is  the  Digital  Divide  A  Virtual  Reality?"  Consumers' 
Research  Magazine  83:  16. 

United  States  Department  of  Commerce.  1999.  Falling  Through  The  Net:  Defining 
the  Digital  Divide,  http://www.ntia.doc.gov. 

.,  2001.  "Bridging  the  Digital  Divide."  The  Other  Side  37:  8. 

.,  2000.  "G8's  Information  Technology  Commitment."  Presidents  and 

Prime  Ministers  9:3. 

.,  2000.  "San  Carlos:  Making  Technology  Work  in  Local  Government." 


Public 
Management  82,"  A  —  5. 

.,  2000.  "The  View  from  out  there."  Inc.  May  16:  49. 

.,  2000.  "Note  From  The  President."  National  Civic  Review  89:  183. 


38 


Political  Activity,  Administrative  Controls  and 

Communications  Technology:  Observations  from 

a  State  Bureaucracy 

Robert  M.  Sanders 
State  University  of  West  Georgia 

Alexander  Y.  Aronson 

State  University  of  West  Georgia 

Abstract 

Attempts  at  separating  politics  from  the  bureaucracy  are  as  old  as  the 
republic  itself.  Founding  presidents  of  all  persuasions  found  electioneering 
by  public  employees  to  be  inconsistent  with  the  Constitution.  In  countering 
the  nation's  early  tradition  of  public  corruption,  several  executive  and 
legislative  enterprises  mandated  restraints  against  partisan  activity  in  the 
public  sector.  The  Civil  Service  Act  created  a  non-partisan  civil  service, 
and  the  Political  Activities  Act  restricted  political  activities  by  bureaucrats. 
Advances  in  communications  technology  allow  employees  to  engage  in  more 
electioneering,  while  agencies  can  monitor  such  activities  with  greater  ease. 
Employee  privacy  rights  have  encountered  employer  entitlements. 

Just  how  productive  are  laws  such  as  the  Civil  Service  or  Political 
Activities  Acts?  In  a  survey  of  employees  in  seven  Georgia  state  agencies,  we 
found  that  most  workers  were  ignorant  of  stipulations  against  partisanship 
in  the  bureaucracy.  We  also  found  that  employees  sought  more  autonomy  to 
engage  in  political  endeavors.  While  partisan  activity  in  these  bureaucracies 
was  not  excessive,  its  curtailment  is  not  impending. 

Prelude  to  Bureaucratic  Reform 

Amid  constant  efforts  to  purify  the  American  political  process,  from 
campaign  contribution  reform  to  reorganization  of  the  massive  federal 
bureaucracy,  efforts  to  monitor  the  partisan  activity  of  public  workers 
remain  an  ongoing  process.  Rosenbloom  (1983)  and  Shafritz,  et  al.  (2001) 
indicate  that  as  early  as  1801,  President  Jefferson  expressed  the  belief  that 
electioneering  by  a  federal  employee  was  "inconsistent  with  the  Constitution 
and  his  duties  to  it,"  while  President  Hayes  in  1877  restricted  employees' 
political  activities  to  those  that  did  not  "interfere  with  the  discharge  of  their 

39 


Political  Activity,  Administrative  Controls  and  Communications  Technology 

official  duties."  In  the  late  1800's,  President  Cleveland  sought  to  prevent 
employees  from  "offending  by  a  display  of  obtrusive  partisanship."  Theodore 
Roosevelt  followed  with  the  decree  that  federal  employees  would  not  use 
their  "official  position  to  the  benefit  of  one  political  party,"  later  forbidding 
any  activity  in  "political  management  or  campaigns." 

The  Evolving  Civil  Service 

Attempts  to  create  a  structured  non-partisan  civil  service  sputtered  with 
President  Grant's  failed  Civil  Service  Commission.  Although  Congress 
approved  legislation  to  create  such  a  commission  in  1871,  members  became 
alarmed  at  the  President's  serious  attempt  to  curtail  Congressional  patronage 
powers;  consequently,  funding  for  the  Civil  Service  was  not  appropriated. 
Earlier,  Congressman  Thomas  Jenckes,  fueled  by  his  contempt  for  President 
Andrew  Johnson,  suggested  that  the  Vice-President  preside  over  a  proposed 
Civil  Service  Commission.  As  the  public  became  increasingly  aware  of  partisan 
efforts  to  derail  reform,  support  for  an  effective  Civil  Service  flourished. 
Exposes  of  corrupt  municipal  operations,  such  as  the  Boss  Tweed  machine 
in  New  York,  aided  the  cause. 

However,  it  would  take  the  assassination  of  President  Garfield  by  a 
deranged  office  seeker  to  provide  the  catalyst  for  the  establishment  of  a 
viable  Civil  Service.  Just  as  President  Kennedy's  assassination  provided  the 
momentum  for  Civil  Rights  legislation,  Garfield's  murder  led  to  Senator 
Pendleton's  Civil  Service  Act.  Finally,  public  personnel  had  its  landmark 
bill,  creating  a  Civil  Service  Commission  to  oversee  hiring,  retention,  and 
activities  of  public  employees  (Shafritz,  et  al.,  2001). 

The  Civil  Service  would  not  be  immune  from  patronage  and  corruption, 
however,  stimulating  efforts  such  as  Franklin  Roosevelt's  Committee  on 
Administrative  Management,  the  Hoover  Commission,  President  Reagan's 
Grace  Commission  and  Bill  Clinton's  National  Performance  Review  to 
restructure  and  create  a  more  efficient  and  honorable  bureaucracy  (Wilson, 
Dilulio,  2001).  Schuman  and  Olufs  (1993)  demonstrate  that  President 
Carter's  Civil  Service  Reform  Act  of  1979  was  a  further  attempt  to  curtail 
bureaucratic  political  activity.  It  established  the  Office  of  Personnel 
Management  to  oversee  federal  employees,  and  the  Merit  Service  Protection 
Board  to  promote  the  political  immunity  of  public  workers. 

Enforcing  Compliance  With  the  Political  Activities  Act 

As  the  New  Deal's  Works  Progress  Administration  officers  used  their 
positions  to  secure  party  votes  among  the  federal  workforce's  legions  of 
Democratic  voters,  Congress  passed  the  Political  Activities  Act  of  1939, 

40 


Robert  M.  Sanders  and  Alexander  Y.  Aronson 

introduced  by  Democratic  Senator  Carl  Hatch  of  New  Mexico.  This  epic 
legislation,  generally  referred  to  as  the  Hatch  Act,  limits  the  political  activities 
of  federal  employees  and  prohibits  the  intimidation  of  voters,  as  well  as  the 
use  of  bribery,  during  elections.  The  Second  Hatch  Act  of  1940  extended 
the  law  to  employees  in  state  agencies  subject  to  federal  financing  (Starling, 
1998).  Under  Hatch  Act  restrictions,  employees  cannot  influence  a  partisan 
election,  be  a  candidate,  campaign  for  a  party,  solicit  contributions,  be  a 
party  officer,  manage  a  campaign,  distribute  campaign  material,  or  endorse 
a  candidate.  However,  employees  may  vote,  register  in  a  party,  contribute 
to  a  campaign,  run  or  participate  in  non-partisan  elections,  be  appointed  to 
public  office,  be  an  election  clerk,  attend  a  political  convention,  be  a  member 
of  a  political  party,  sign  petitions,  or  appeal  to  a  member  of  Congress  (Cooper, 
1983;  Welch,  et  al.,  1999). 

As  the  use  of  teletype  and  long-distance  telephone  became  more 
widespread,  it  became  a  daunting  task  for  public  officials  to  monitor  partisan 
abuses  by  employees.  The  state  of  the  technology  at  that  time  did  not  allow 
for  detailed  record-keeping  of  contacts  that  could  be  traced  to  political  bases 
of  operation,  nor  could  such  partisanship  be  easily  observed. 

The  1 977  benchmark  case  oiElrod  v.  Burns,  however,  sustained  protections 
against  political  coercion  against  public  workers  as  outlined  by  Hatch.  Here, 
the  Supreme  Court  decreed  that  incoming  municipal  administrations  could 
not  systematically  replace  non-civil  service  employees  of  the  opposite  party. 
Stating  that  this  seasoned  practice  was  unconstitutional  and  a  restraint  on 
freedom  of  association,  the  Court  mandated  the  reinstatement  of  Cook 
County  Sheriff  John  Burns  in  Illinois.  Ironically,  Burns  obtained  his  job  in 
the  same  manner  as  his  dismissal.  In  dissension,  Justice  Brennan  asserted  that 
patronage  hiring  has  "historically  contributed  to  the  practical  functioning 
of  our  democratic  system."  The  Burns  case  was  upheld  in  1980,  in  Branti 
v.  Finkel,  in  Rockland  County,  New  York.  The  courts,  and  sympathetic 
presidents  such  as  Kennedy,  have  generally  supported  employee  freedom  of 
speech  and  association  issues,  as  well  as  the  right  to  join  unions.  However, 
Hatch  Act  constraints  usually  hold  up  to  judicial  review.  The  1947  Supreme 
Court  case  of  United  Public  Workers  v.  Mitchell  and  the  1972  case  of  National 
Association  of  Letter  Carriers  v.  Civil  Service  Commission,  upon  appeal  to  the 
High  Court,  reaffirmed  employee  political  restrictions  (Sylvia,  1994). 

A  Non-Partisan  Bureaucracy  and  Electronic  Privacy 

In  1990,  the  Hatch  Act  was  again  in  the  center  of  political  controversy. 
After  intensive  lobbying  by  employee  unions,  Congress  voted  overwhelmingly 

41 


Political  Activity,  Administrative  Controls  and  Communications  Technology 

to  allow  federal  workers  to  hold  office  in  political  organizations,  engage 
in  political  activities,  and  campaign  while  not  on  duty.  President  George 
H.  Bush,  however,  viewed  this  legislative  action  as  a  Democratic  initiative; 
consequently,  he  vetoed  the  effort.  A  subsequent  override  attempt  was 
unsuccessful  (Shafritz,  et  al.,  2001). 

In  1993,  Congress  again  approved  amendments  to  the  Hatch  Act.  This 
time,  President  Clinton  signed  the  legislation  allowing  all  Merit  Service 
employees  to  engage  in  political  activities  away  from  the  workplace.  They 
may  now  contribute  to  political  organizations,  engage  in  campaigns,  solicit 
contributions,  recruit  volunteers,  display  partisan  signs,  and  speak  on  behalf  of 
candidates  (Anonymous,  1996).  However,  Hatch  still  allows  for  Congressional 
oversight  of  bureaucratic  partisanship,  particularly  in  regard  to  union  activity 
in  elections,  as  well  as  other  ethical  considerations.  Also,  employees  of 
politically  sensitive  agencies  are  subject  to  the  original  mandates  of  the  Act. 
Such  agencies  include  the  Federal  Elections  Commission;  Federal  Bureau  of 
Investigation;  Secret  Service;  Central  Intelligence  Agency;  National  Security 
Council;  Defense  Intelligence  Agency;  Merit  Service  Protection  Board; 
Internal  Revenue  Service;  Department  of  Justice;  Customs  Service;  and 
Bureau  of  Alcohol,  Tobacco  and  Firearms  (Cayer,  1996). 

At  that  same  time,  greater  advances  in  communications  technology  allowed 
for  controversial  surveillance.  Video  tracking  of  employee  locations,  tapping 
of  agency  telephones  and  e-mail  transfers,  and  computer  record-keeping 
has  eased  the  difficulty  of  observing  partisan  activity.  Is  an  employee's 
telephone,  e-mail,  electronic  bulletin  board,  or  computer  hard  drive  open 
to  investigations  of  Hatch  violations,  or  are  they  the  private  domain  of  the 
individual?  The  Privacy  Act  of  1 974  excludes  adverse  personnel  action  based 
on  the  private  communications  of  the  employee.  However,  an  employee's 
expectation  of  privacy  under  the  Electronic  Communications  Privacy  Act 
of  1984  does  not  extend  to  constraints  against  officials  reviewing  employee- 
generated  e-mails,  particularly  in  the  case  of  a  public  agency's  compelling 
interest  in  observing  partisan  bureaucratic  activity.  An  employer's  authority 
to  monitor  e-mails  was  upheld  in  the  U.S.  District  Court  case  of  Smyth  v.  The 
Pillsbury  Company  (Cozzeto  and  Pedeliski,  1997). 

Compliance  with  the  Hatch  Act 

Some  40%  of  all  state  and  local  employees  state  they  would  participate 
more  actively  in  politics  if  Hatch  Act  regulations  were  relaxed  (Tompkins, 
1995).  However,  in  Georgia,  a  survey  of  career  employees  of  five  state 
executive  branch  agencies,  a  governor's  commission,  as  well  as  the  legislature,1 

42 


Robert  M.  Sanders  and  Alexander  Y.  Aronson 

revealed  that  legal  restrictions  do  not  necessarily  curtail  bureaucratic  partisan 
politics,  particularly  in  the  state's  newly  revised  bureaucracy,  where  the  civil 
service  has  been  eliminated.2 

The  survey  included  the  following  questions  and  responses  (n=60): 

Are  you  familiar  with  the  Hatch  Act  of  1940? 

Yes-  10%  No-  90% 

Do  you  know  of  a  public  official  who  has  pressured  an  employee  to 
amend  public  policy  for  that  official's  political  benefit? 

Yes-  30%  No-  70% 

Do  you  know  any  state  employees  who  openly  campaign  for  elected 
officials  while  at  the  workplace? 

Yes-  10%  No-  90% 

Should  political  discussions  be  allowed  at  work  during  breaks? 

Yes-  100%        No-  0% 
Do  you  know  any  state  employee  who  holds  funds  for  a  political 
party? 

Yes-  10%  No-  90% 

Would  you  foresee  punishment  for  a  state  employee  who  brought 
party  politics  to  the  workplace? 

Yes-  40%  No-  60% 

Do  you  know  any  state  employee  who  openly  participates  in  party 
politics  at  the  workplace? 

Yes-  10%  No-  90% 

Have  you  received  political  e-mails  from  fellow  employees? 

Yes-  5%  No- 95% 

Do  you  know  any  state  employee  who  is  a  delegate  to  a  party 
convention? 

Yes-  5%  No- 95% 

Do  you  know  any  state  employee  who  solicits  funds  for  a  political 
party? 
Yes-  5%  No- 95% 

Conclusions 

Results  indicate  that  state  employees  seek  some  relaxations  of  the  Hatch 
Act,  such  as  the  open  discussion  of  partisan  politics  during  recesses.  Recently, 
the  Supreme  Court  upheld  employee  prerogatives  to  conduct  religious 
dialogues  while  on  break  (Starling,  1998).  While  Georgia  workers  are 
rather  ignorant  of  Hatch  Act  directives,  political  activities  are  not  rampant 
in  the  workplace. 

43 


Political  Activity,  Administrative  Controls  and  Communications  Technology 

However,  some  employees  do  engage  in  party  politics  while  on  duty,  such 
as  expressing  support  for  candidates,  wearing  campaign  pins,  and  distributing 
political  literature,  including  e-mail  messages.  There  also  appears  to  be  little 
agency  enforcement  of  the  Act,  nor  monitoring  of  party  action  or  the  use 
of  technology,  such  as  e-mail  surveillance,  to  ensure  compliance.  With  the 
prevailing  perception  that  few  sanctions  exist,  partisan  activity  will  remain  a 
component  of  the  public  employment  environment. 

Notes 

1  Employees  were  surveyed  by  questionnaire  in  a  state  administration  building 
cafeteria  during  lunch.  Those  polled  were  employees  of  the  Georgia  Department  of 
Transportation,  Department  of  Human  Services,  Department  of  Labor,  Department 
of  Revenue,  Department  of  Administrative  Services,  Georgia  Legislature  and 
Public  Service  Commission. 

2  In  1995,  the  GeorgiaGain  program  declassified  most  positions  formally  covered 
under  the  Merit  System.  Employee  evaluations  were  revised  and  corresponding  wages 
were  developed  to  be  comparable  to  the  private  sector.  Enacted  by  previous  Governor 
Zell  Miller,  the  politically  popular  policy  is  understandably  loathed  by  Georgia's 
public  workers  who  have  lost  several  employee  protections. 

References 

Anonymous.  "Don't  get  hatched."  Campaigns  &  Elections.   17(1996):9. 

Cayer,  Joseph.  Public  Personnel  Administration  in  the  United  States.  New  York:  St. 
Martin's,  1996. 

Cooper,  Phillip.  Public  Law  &  Public  Administration.   Palo  Alto,  CA:  Mayfield, 
1983. 

Cozetto,  Don  and  Theodore  Pedeliski.  "Privacy  and  the  Workplace:  Technology 
and  Public  Employment."  Public  Personnel  Management.  26  (1997):  515-525. 

Rosenbloom,  David.  Public  Administration  and  Law.  New  York:  Dekker,  1983. 

Schuman,  David,  and  Dick  Olufs.  Public  Administration  in  the  United  States. 
Lexington,  MA:  Heath,  1993. 

Shafritz,  Jay,  et  al.  Personnel  Management  in  Government.  New  York:  Dekker,  2001. 

Starling,  Grover.  Managing  the  Public  Sector.  Fort  Worth,  TX:  Harcourt  Brace, 
1998. 

Sylvia,  Ronald.  Public  Personnel  Administration.  Belmont,  CA:  Wadsworth,  1994. 

Tompkins,  Jonathan.  Human  Resource  Management  in  Government.  New  York: 
HarperCollins,  1995. 


44 


Robert  M.  Sanders  and  Alexander  Y.  Aronson 

Welch,  Susan,  et  al.  Understanding  American  Government.  Belmont,  CA:  West/ 
Wadsworth,  1999. 

Wilson,  James  and  John  Dilulio.  American  Government.  Lexington,  MA:  Heath, 
2001. 


45 


Innovation,  Technology  and  Municipal 
Governments 

Dahlia  Bradshaw  Lynn 
University  of  Southern  Maine 

Abstract 

Information  technologies  increasingly  serve  as  powerful  tools  for  government 
and  other  public  sector  organizations.  Municipal  governments  are  rushing 
to  implement  new  management  information  systems  and  computerized 
operations  designed  to  substantially  increase  effectiveness  and  efficiency 
in  the  delivery  of  public  services,  the  management  of  critical  information 
sources  for  decision-making  and  the  formulation  of  public  policy.  While 
significant  attention  is  paid  to  the  design  and  implementation  phases  of 
launching  new  technology,  these  systems  also  require  new  policies  and 
procedures  for  managing  and  disseminating  information  and  knowledge. 
This  paper  presents  the  findings  of  a  statewide  survey  of  494  municipalities 
in  Maine  examining  technological  innovation  in  local  government,  the 
utilization  of  technology  for  service  delivery,  and  evolving  workforce  issues 
as  a  result  of  technological  change.  The  survey  results  indicate  that  public 
sector  employees  caught  in  the  implementation  of  new  technology  are  often 
involved  in  extensive  organizational  change  initiated  by  the  adoption  of 
these  new  information  management  approaches.  Ultimately,  government 
agencies  seeking  to  embrace  new  technology  must  recognize  that  employee 
resistance  to  technology  is  also  resistance  to  organizational  change.  Failure  on 
the  part  of  public  managers  to  address  the  human  side  of  technology  launch, 
the  transformational  impact  of  information  systems,  and  computerization 
on  the  nature  of  work  within  government  places  the  adaptation  of  such 
technology  at  risk. 

Introduction 

The  information  age  ushered  in  by  the  marriage  of  computers  and 
telecommunications,  compressing  time  and  space,  has  transformed  the 
workplace,  the  nature  of  government  services,  and  the  quality  of  individual 
lives  and  communities.  The  promises  of  technology,  better  and  more  efficient 
administration  of  public  services  have  not  escaped  public  organizations, 
confronted  with  mounting  pressures  to  reinvent  themselves  into  lean  "service" 
machines.  Characteristics  of  technology  often  facilitate  organizational  change 

47 


Innovation,  Technology  and  Municipal  Governments 

through  the  stimulus  of  new  technology  (Kolodny,  Liu,  Stymne  and  Denis, 
1996).  For  governmental  entities,  information  technologies  are  transforming 
the  way  public  sector  organizations  organize  and  administer  themselves  and 
how  important  public  goods  and  services  are  delivered  to  taxpayers  and 
beneficiaries.  As  a  result,  computers  and  other  forms  of  information  handling 
devices  and  technologies  impact  the  very  nature  of  an  organization's  structure, 
employment  patterns,  and  the  quality  of  work  life  for  its  employees,  the 
nature  and  prioritizing  of  work,  and  the  management  of  resources.  This  paper 
is  divided  into  four  sections.  The  first  describes  the  nature  of  technology 
growth  in  the  public  sector  and  the  challenges  inherent  in  the  utilization 
of  technology  in  the  provision  of  government  services.  The  second  section 
provides  an  overview  of  the  organizational  and  workforce  benefits  and  costs 
associated  with  technology  in  public  sector  organizations.  Thirdly,  results 
of  a  statewide  survey  of  municipalities  in  Maine  are  presented  indicating  the 
extent  to  which  computerization  and  technology  innovation  are  affecting 
the  nature  of  local  government,  the  services  provided  and  the  impact  on 
government  employees.  Finally,  this  paper  provides  important  survey  findings 
for  other  municipal  entities  considering  technology  innovation,  strengthens 
current  research  regarding  the  outcomes  of  technology  and  adds  knowledge  to 
the  body  of  literature  regarding  the  increasing  importance  of  "e-government" 
and  the  launching  of  computerization  and  information  management  systems 
in  municipal  government. 

Technology  Growth  in  the  Public  Sector 

Municipal,  state  and  federal  agencies  are  rushing  headlong  to  develop 
management  information  systems  designed  to  substantially  increase 
effectiveness  and  efficiency  in  the  delivery  of  public  services  and  the 
management  of  critical  information  sources  for  decision-making  and  the 
formulation  of  public  policy.  Estimates  between  3  and  17  percent  are 
suggested  as  an  accurate  reflection  of  the  current  level  of  state  budget 
expenditures  for  information  resource  management  (Caudle  et  al.,  1989 
and  Fletcher  and  Foy,  1994).  Municipalities  are  also  allocating  resources 
for  technological  innovation,  estimated  now  at  three  percent  of  operating 
budgets  as  of  1993  (Kraemer  and  Norris,  1994).  The  role  of  information 
technology  in  the  public  sector  has  grown  substantially,  evidenced  by  the 
commitment  of  over  $23.5  billion  towards  IT  by  the  federal  government  in 
1994  alone  (GAO,  1996b).  Dollars  invested  are  only  one  small  measure  of 
the  impact  of  technology  and  the  growing  dependence  upon  every  aspect  of 
government  operations  on  information  systems  (GAO,  1997b).    State  and 

48 


Dehlia  Bradshaw  Lynn 

local  governments  are  also  actively  engaged  in  the  investment  for  information 
technology.  The  allocation  of  resources,  (estimated  at  over  $45  billion  by 
the  year  2001  (GS2  Research,  1996)  and  the  commitment  of  public  sector 
positions  towards  computer- related  responsibilities  (at  least  20%  of  executive 
branch  state -workers  (Candle  &  Marchand,  1989)  provides  strong  evidence 
state  and  municipal  entities  are  rapidly  engaging  in  the  development 
and  implementation  of  information  technologies.  Work  by  Northrop, 
Kraemer,  Dunkle  and  King  (1990)  found  that  those  cities  and  counties 
with  populations  over  50,000  use  computer  technology  to  support  a  variety 
of  business  activities,  both  work  applications  and  administrative  support 
systems.  Work  underwritten  by  the  Council  for  Excellence  in  Government 
indicate  a  growing  number  of  state  governments  are  developing  greater 
capacities  for  the  allocation  of  important  resources  for  the  development 
of  information  technologies  and  infrastructure.  However,  the  study  also 
determined,  "many  small  to  mid-size  cities  and  counties  could  well  be  labeled 
"technology  have-nots"  due  to  the  lack  of  resources  they  have  to  spend 
on  information  management  and  technology"  (Center  for  Technology  in 
Government,  1997  p. 5).  The  1998  IPMA  Technology  Survey  confirmed 
the  growing  expansion  of  information  and  telecommunication  technologies 
in  cities  with  populations  over  100,000  and  the  development  of  Internet, 
intranet,  web  pages  and  electronic  commerce  activities  (IPMA,  1998). 

Heavy  investment  in  information  systems  and  the  ensuing  allocation 
of  substantial  resources  in  time,  personnel  and  capital  are  done  to  gain 
advantages  in  both  operational  and  managerial  functions  (Tapscott  & 
Caston,  1993;  Brown  &  Brudney,  199).  Yet,  the  nature  of  computing  in 
the  public  sector  is  often  characterized  by  resource  problems,  fewer  access  to 
technical  resources  and  a  large  gap  between  the  technology  available  and  that 
needed.  Success  therefore,  can  be  elusive,  benefits  meager  and  expectations 
of  enhanced  efficiency  and  effectiveness  dashed  by  either  technological, 
organizational  or  workforce  constraints.  "For  many  public  sector  agencies, 
dysfunctional  systems  that  impede  productivity  and  thwart  effective  service 
delivery  are  too  often  the  rule  rather  than  the  exception"  (Brown  and 
Brudney,  1998).  In  local  government,  the  "sociotechnical"  interface  between 
end  users  and  computer  design  specialists  is  significant,  stressing  the  need 
for  understanding  the  complexity  of  technological  problems  facing  public 
sector  organizations  and  the  attitudes  of  service  providers  (Danger,  1 993) . 
Economics,  politics  and  organizational  design  create  technological  difficulties 
for  public  sector  organizations.  Public  sector  employees  caught  in  the 
transition  to  new  technology  are  involved  in  often  abrupt  and  massive 

49 


Innovation,  Technology  and  Municipal  Governments 

organizational  change,  initiated  by  the  adaptation  of  new  management 
information  and  automation  approaches.  Frequently,  the  lack  of  clear  and 
committed  long-range  policy  to  technological  development  impacts  on  the 
level  of  budgeting  for  adoption  of  new  technologies,  both  in  the  ability  to 
attract  key  technical  personnel  and  adequately  fund  and  manage  complex 
systems.  With  the  evolution  of  computing  and  new  technologies  there 
are  unprecedented  opportunities  for  government  organizations  to  achieve 
organizational  goals  and  troublesome  challenges  for  the  management  of 
such  efforts  (Kraemer  and  Dedrick,  1997).  This  article  consequently, 
focuses  on  the  management  and  impact  of  computing,  the  diffusion  of 
computing  innovation  and  the  relationship  between  technology,  employees 
and  organizational  work  life  of  these  public  organizations. 

Organizational  Impact  of  Technology 

There  are  a  variety  of  findings  in  the  literature  regarding  the  impact 
of  technology  on  public  organizations.  Conflicting  conclusions  are  to 
a  great  extent  reflective  of  the  fact  that  the  impact  of  technology  and 
computerization  is  unique  for  each  organization.  Individual  agencies  or 
governmental  units  may  be  at  very  different  stages  of  expertise  regarding  their 
technical  sophistication  or  in  the  stages  of  technology  implemented  by  these 
organizations.  The  assessment  of  technology's  impact  is  also  dependent 
upon  time,  often  expressed  in  the  learning  needs  of  employees  to  upgrade  skills 
and  expertise,  the  localized  nature  of  workflow  improvements  and  the 
political  nature  of  the  tasks  accomplished  by  public  sector  organizations 
(Northrop,  Kraemer,  Dunce  and  King,  1990).  Launching  technology  in  the 
public  sector  often  focuses  on  the  net  effects  of  technology  improving  the 
work  of  government  and  other  public  organizations.  Benefits  of  technology  in 
the  workplace  have  been  characterized  as  primarily  those  associated  with  either 
work  processes  (improved  availability  of  information  and  greater  efficiency) 
or  those  associated  with  the  allocation  and  control  over  information  as 
organizational  resources  (Downs,  1967).  The  impact  of  the  information  age 
is  not  without  consequences  to  the  individuals  within  the  organization  as 
well.  Early  work  by  Warren  and  Slater  ( 1 968)  recognized  that  the  adaptability 
and  flexibility  of  an  organization  is  couched  in  people's  ongoing  ability  to 
adjust  to  a  new  organizational  culture,  with  rapidly  shifting  job  requirements. 
As  technology  is  redefining  the  concept  of  work,  it  is  also  redefining  the 
nature  of  where  work  takes  place,  the  nature  of  supervisory  relationships 
and  reporting  structures,  performance  measurement  and  the  monitoring 
of  employees  and  tasks.    Work  once  confined  to  specific  space  now  takes 

50 


Dehlia  Bradshaw  Lynn 

place  in  a  variety  of  settings.  The  ability  to  connect  in  seconds  has  replaced 
what  once  took  hours  or  days.  The  multidimensionality  of  work  locations 
now  also  means  that  employees  are  increasingly  accessible  -  by  fax,  email, 
cellular  phone,  pagers  and  voice  mail,  extending  beyond  time  clocks  and 
shift  assignments. 

Traditional  organizational  structure  based  on  reporting  relationships, 
and  job  titles  are  tested  by  the  linkages  established  between  people  based 
on  what  they  know  rather  than  by  job  title.  The  understanding,  utilization 
and  optimization  of  new  information  and  knowledge  in  new  ways  ultimately 
requires  individuals  who  are  comfortable  with  change  and  the  recognition 
that  many  individuals  may  be  left  behind.  As  organizations  quickly  determine, 
the  implementation  of  technology  and  the  utilization  of  computers  are  not  an 
exercise  couched  in  neutrality  or  the  adaptation  of  a  benign  tool.  The  potency 
of  technology  ultimately  results  in  organizational,  factional  and  individual 
winners  and  losers.  Much  of  the  victory  or  defeat  is  based  on  the  essential 
transformation  of  data  into  information  and  the  significance  attached  to  the 
acquisition,  access  and  control  of  that  information. 

The  Maine  Experience 

The  topography  of  this  rugged,  geographically  diverse  State  has  played 
and  continues  to  play  a  significant  role  in  the  development  and  growth  of 
Maine's  494  organized  communities.  Given  the  population  (slightly  over 
1.2  million)  the  land  area,  (almost  31,000  square  miles)  and  the  distance 
between  communities,  adequate  transportation  and  communication  has 
always  been  a  key  factor  in  the  development  of  Maine  communities  (MMA, 
2001).  A  majority  of  Maine  cities  are  located  on  the  waterways  of  the  state, 
providing  both  power  for  industry  and  a  transportation  link  with  the  sea 
for  commerce  and  trade.  Until  the  late  1970s  more  than  seventy  percent  of 
Maine's  population  resided  in  a  twenty-mile  corridor  on  either  side  of  the 
interstate  highway  system.  In  stark  contrast,  more  than  forty  percent  of 
the  northwest  land  area  of  the  state  is  inhabited  by  approximately  6,000 
people  (MMA,  2001).  In  the  form  of  "unorganized  townships,"  these 
governmental  units  have  no  municipal  oversight  and  are  both  taxed  and 
supervised  directly  by  the  state  of  Maine.  Local  governments  in  Maine 
provide  essential  services  to  the  citizens  of  their  community,  including  road 
construction  and  maintenance,  solid  waste  disposal,  water  utilities  and  waste 
water  treatment,  police  and  fire  protection  and  emergency  rescue,  land 
use  planning  and  building  inspection,  welfare  and  elementary/secondary 
public  education.  The  isolation  of  many  communities  and  the  lack  of 

51 


Innovation,  Technology  and  Municipal  Governments 

regional  government  infrastructure  provide  unique  opportunities  and 
challenges  to  local  governments  in  Maine  as  these  municipalities  seek  to 
serve  their  citizens. 

Survey  Findings 

In  an  effort  to  assess  the  utilization  and  impact  of  information  technology, 
computerization  and  communication  applications  among  local  governments, 
a  mail  survey  was  distributed  by  the  Maine  Municipal  Association1  (MMA) 
to  its  membership  of  494  municipalities.  The  survey,  examined  three  specific 
aspects  of  technology  utilization,  (1)  technology  applications  and  functions; 
(2)  perceptions  of  technology/ computer  benefits  and  costs;  and  (3)  technology 
management  and  workplace  issues.  Two  hundred  and  seventy-nine  of  494 
municipalities  completed  and  returned  the  MMA  survey  for  a  response  rate 
of  56.4  percent.  Survey  respondents  included  a  wide  variety  of  municipal 
administrators,  including  Town  Managers  (41.5%),  Select-persons  (34.4%); 
Finance/Fiscal  Officials  (6.7%);  and,  Town  Clerks  and  Administrative 
Personnel  (9.0%).  Only  six  individuals  (2.0%  of  all  respondents)  identified 
themselves  as  either  Information  Management  (IM)  or  Information  Systems 
(IS)  personnel  (one  of  whom  is  an  IS  Manager  for  a  Native  American  tribal 
nation).  The  composition  of  the  respondents  confirms  findings  in  other 
municipal  research  (ICMA,  2000)  suggesting  that  smaller  municipalities' 
lack  of  resources  add  to  the  constraints  of  providing  in-house  technological 
expertise.  Limited  resources  in  small  municipalities  and  external  controls 
exerted  by  executive  and  legislative  branches  of  government  create  additional 
burdens  in  the  creation  of  specialized  technology  positions  and  often  hinder 
public  agencies'  ability  to  meet  increased  internal  demands  for  information 
systems  knowledge.  Given  these  constraints,  typically,  information  manage- 
ment employees  in  many  public  agencies  have  grown  into  their  positions  by 
initially  managing  data  entry  systems  rather  than  knowledge,  formal  training 
or  education.  Clearly  this  is  the  case  among  Maine  municipalities  where  slack 
resources  for  expert  positions  are  relatively  absent. 

Technology  Applications  and  Functional  Choices 

Skinner  ( 1 979)  argues  that  the  direct  impact  of  technology  on  the  work 
environment  is  extraordinarily  pervasive,  ultimately  effecting  decisions 
impacting  which  work  or  portions  of  work  will  be  done,  who  will  perform 
the  work  and  under  what  conditions  and  location  the  work  be  performed. 
Evidenced  by  more  recent  findings  regarding  the  payoff  of  technologies 
in  public  organizations  (Northrop,  1998),  the  impact  of  technology  does 
differ  greatly  from  one  to  another,  the  choice  of  which  technology  ultimately 

52 


Dehlia  Bradshaw  Lynn 

affects  the  long-term  performance  of  the  organization  and  its  ability  to  meet 
its  strategic  role  and  mission. 

There  are  numerous  ways  computers  can  be  utilized  by  managers,  from 
enhanced  electronic  communications  to  data  retrieval  and  analysis.  Traditional 
systems  design  highlighted  the  system  requirements  necessary  to  improve 
work-flow,  often  involving  the  development  of  work  practices  seeking  to 
improve  effectiveness  and  efficiency  frequently  centering  on  the  automation 
of  discrete  functions  such  as  purchasing,  payroll,  financial  accounting  or 
documenting  service  provision  (Berg,  1998).  This  notion  is  echoed  by 
findings  generated  in  this  survey.  Specific  data  and  reporting  management 
functions  were  the  most  frequently  identified.  These  included  tax  records  and 
billing  (93.0%),  accounts  payable  and  receivable  (92.2%),  budgeting  and 
fiscal  reporting  (92.0%),  payroll  (79.1%)  and  archival  management  such  as 
voter  registration  and  vital  statistics  (77.3%).  The  least  frequently  identified 
functions  included  code  enforcement,  property  assessment/valuation 
activities  and  workload  scheduling  (16.3%,  19.6%  and  19.0%  respectively). 
Clearly,  computer-based  financial  resource  information  is  important  to  these 
municipal  managers  for  both  intra-organizational  tasks  (producing  budgets, 
identifying  slack  resources  and  monitoring  expenses)  and  inter-organizational 
responsibilities  (debiting  and  crediting  taxpayer  accounts,  verifying  eligibility 
for  entitlement  programs  and  documentation). 

Technology  Benefits  and  Costs 

Transformational  technology  efforts  are  undertaken  on  the  basis  of 
important  organizational  decisions  regarding  the  flow  and  access  of 
information.  These  decisions  are  predicated  on  answering  important 
organizational  questions  on  whether  the  overall  productive  value  of  the 
investment  is  worth  the  overall  acquisition  and  operational  costs.  Literature 
examining  technology  utilization  identifies  both  external  (client  centered)  and 
internal  (organization  centered)  benefits;  including  enhanced  and  expanded 
service  delivery,  greater  organizational  efficiency  and  effectiveness  (Kraemer, 
et.  alT985;  Lucas,  1981;  Orilkowski,  1992;  Kling,  1993).  The  results  of  this 
statewide  municipal  survey  replicate  these  findings. 

When  asked  to  identify  organizational  benefits  respondents  identified 
saving  time  (79.2%),  greater  accuracy  and  work  (66.8%),  saving  money 
(64.6%),  immediacy  of  information  access  (56.1%)  and  better  internal 
communication  (43.6%).  Perceived  external  benefits  included  enhanced 
ability  for  external  communication  (73.5%),  better  customer  service  (70.2%), 
and  enhanced  opportunities  for  expanded/improved  services  (61.3%).  High 

53 


Innovation,  Technology  and  Municipal  Governments 

performance  computing  does  not  automatically  translate  into  improvement  in 
organizational  performance.  While  both  public  and  private  sector  managers 
place  a  substantial  reliance  on  technology  there  is  a  growing  body  of  research 
suggesting  that  "technology  alone  is  sufficient  to  the  task"  (Chisholm,  1988; 
Zuboff,  1985;  Weik,  1987).  The  value-added  worth  of  computer  systems 
is  based  in  part,  on  the  processes  used  to  introduce  technology  in  the 
workplace.  In  the  public  sector,  the  value-added  nature  of  technology,  both 
in  meeting  increasing  information  demands,  places  a  high  premium  on 
unparalleled  information  access  (technology)  and  technology's  appeal  and 
potential  power  affecting  both  the  individuals  and  organizations  that  use 
it  (Kraemer  and  King,  1986). 

The  attractiveness  of  technology  in  achieving  greater  outcomes  of 
effectiveness  and  efficiency  is  offset  by  a  number  of  organizational  costs.  The 
organizational  price  of  technology  reflects  a  number  of  interrelated  issues 
including  vendor  dependency  and  effectiveness,  cost  issues  (whether  capital, 
production  and/or  human  resource),  workforce  outcomes  (productivity  and 
performance)  and  employee  attitudes  towards  technology  and  computerization. 
When  asked  to  indicate  the  most  likely  areas  considered  to  be  problematic 
with  the  implementation  of  technology,  respondents  in  the  Maine  municipal 
survey  indicated  that  internal  and  external  workforce  factors  and  attitudinal 
issues  were  the  most  significant.  The  external  workforce  problems  identified 
include;  (1)  the  quality  of  vendor  support  during  transition  (70.0%);  (2) 
the  reliability  of  vendor  training  (67.8%);  (3)  the  availability  of  resources 
for  ongoing  training/development  of  employees  (67.1%),  (4)  the  loss  of 
employee  productivity  during  training  (62.0%),  and  (5)  the  cost  of  employee 
training  (42.6%).  These  results  echo  Northrop  et  al.'s  (1994)  investigation 
of  data  from  over  three  thousand  municipal  employees  which  found  training 
to  be  an  important  and  underutilized  asset,  and  instrumental  in  overcoming 
limitations  in  both  software  and  employee  experience  in  computing.  While 
new  systems  training  is  an  important  element  in  ensuring  the  success  of  new 
technology,  of  equal  if  not  greater  importance  are  the  activities  leading  up 
to  training  (Caudron,  1998).  Training  and  development  efforts  for  public 
sector  employees  receive  short  shrift  as  many  agencies  have  limited  resources 
for  training  costs.  Less  than  three  percent  of  municipal  and  state  budgets  are 
allocated  for  the  training  and  development  of  public  employees.  Often  smaller 
statewide  agencies,  municipalities  or  limited  size  nonprofit  organizations' 
lack  of  resources  add  to  the  constraints  of  providing  in-house  technological 
expertise.  Overall,  training  and  development  is  often  intermittent,  resulting 
in  little  formal  planning  to  keep  workers'  knowledge  on  the  cutting  edge. 

54 


Dehlia  Bradshaw  Lynn 

The  ability  to  provide  ongoing  training  and  development  opportunities  to 
develop  a  cadre  of  trained  personnel  often  becomes  a  political  decision  as 
agencies  compete  for  limited  resources.  Yet,  everything  suggests  that  a  positive 
outcome  of  launching  new  technology  in  organizations  is  highly  dependent 
on  the  training  and  career  development  of  employees. 

The  value  of  training,  from  the  perspective  of  the  survey  respondents  is 
tempered  by  externalities  associated  with  vendor  availability,  support  and 
reliability  during  the  transition  and  training  process.  Given  the  importance 
of  computer  literacy  and  prior  training  to  the  success  of  technology  adoption, 
the  "short  shelf  life"  of  many  computer  and  technology-consulting  firms  is  a 
significant  issue  for  municipal  managers  in  the  survey  as  there  is  no  guarantee 
that  even  a  well-known  vendor  won't  vanish  unexpectedly. 

As  significant  as  vendor  performance,  the  debate  over  the  value  of 
information  technology  investment  has  not  gone  unnoticed  by  public  sector 
managers  and  local  leaders.  Municipal  governments  find  themselves  (as  with 
other  public  sector  organizations)  increasing  expected  to  "do  more  with  less." 
Calculating  the  return  in  the  public  sector  is  difficult  given  the  provision  of 
public  services  (Kraemer  and  Dedrick,  1994).  Just  as  a  greater  emphasis  on 
workplace  flexibility  and  team  or  project  management  is  replacing  traditional 
command  structures  in  organizations,  so  too  are  productivity  measures  altered 
by  technology.  The  speed  of  technology  impacts  workplace  rhythm  increasing 
in  both  load  and  rate  of  work.  Employees  find  themselves  under  pressure 
with  newly  available  technology  to  increase  productivity  at  the  same  time 
they  are  learning  new  systems  and  software.  The  National  Research  Council's 
report,  "Information  Technology  in  the  Service  Society,"  recognizes  that  the 
public  sector  has  not  adopted  information  technology  with  uniform  success 
(NRC,  2000).  The  report  notes  that  most  problems  in  achieving  payoffs  from 
investments  in  information  technology  have  arisen  from  inadequate  planning 
and  implementation— including  failures  to  provide  adequate  training  for 
workers,  to  pay  sufficient  attention  to  customer/client  needs,  and  to  rethink 
how  institutions  should  operate. 

Clearly,  technological  innovation  changes  the  way  work  is  completed, 
often  forcing  workers  to  reprioritize  tasks,  project  deadlines  and  other 
schedules  to  handle  the  communications  overload  (Pitney  Bowes  Inc.,  1998). 
The  complexity  of  organizational  adaptation  to  technology  and  information 
management  systems  is  evident  when  technology  is  optimized  without 
addressing  other  aspects  of  the  organizational  behavioral  systems  whether 
cultural,  social  or  psychological.  Employee's  reasons  for  resisting  technology 
are  often  based  on  their  disconnection  to  the  new  initiatives,  decreasing 

55 


Innovation,  Technology  and  Municipal  Governments 

self-confidence  in  their  ability  to  learn  new  skills,  assumptions  of  difficulty  in 
adapting  to  new  systems  and  fear  of  displacement.  Decreases  in  productivity, 
employee  turnover,  low  morale,  turf  battles  or  employee  indecisiveness  often 
characterizes  employee  resistance  to  the  pace  or  degree  of  change. 

As  indicated  in  the  following  summary  findings,  the  municipal  survey 
respondents  see  attitudinal  issues  as  significant  barriers  to  technology 
implementation.  These  obstacles  included,  (1)  employee  resistance  to  the 
computerization  of  tasks  (71.2%);  (2)  under-utilization  of  software,  new 
systems  or  computerized  operations  (69.2%);  (3)  decreased  employee 
productivity  due  to  resistance  (66.2);  and  (4)  managerial/supervisory 
resistance  to  technology  (56.0%). 

Resistance  can  be  based  on  employee  limitations  -  barriers  that  represent 
their  understanding  of  the  new  technologies,  including  concerns:  workers  age, 
culture,  ways  of  working,  social  needs  and  educational  levels.  Additionally, 
there  may  be  limitations  embedded  in  the  technology  that  even  committed 
employees  may  be  unable  to  resolve.  Winslow  and  Bramer  identify  several 
types  of  resistance  to  technology  launches  in  organizations  including  culture, 
age,  socio-economic  status,  habit,  education,  and  systems  design  familiarity. 
Each  of  these  factors  can  provide  insights  into  the  ways  in  which  systems 
design  can  address  the  needs  of  real  workers  rather  than  creating  systems 
designed  to  address  the  needs  of  employee  profiles. 

Public  sector  managers  who  traditionally  based  their  role  in  the  organization 
on  pay  grade  and  job  classification  see  their  status  often  disregarded  in  the 
pursuit  of  a  solution.  New  information  alliances  within  organizations  are 
based  less  on  organizational  charts  and  more  across  organizational  boundaries 
-  following  the  information,  rather  than  job  function  or  title.  Trying  to 
avoid  the  discomfort  of  change  provides  for  rear  guard  action  and  fights  as 
individuals  and  organizations  seek  to  avoid  obsolescence  (Synder,  1996). 
Resistance  to  technological  innovation  may  be  reflective  of  the  way  in  which 
computing  is  viewed,  traditionally  as  an  electronic  version  of  secretarial 
duties.  The  cultural  context  of  employee's  lives  frames  the  way  one  is  oriented 
towards  work  -  and  technology  is  a  part  of  that  framework.  In  many  public 
sector  organizations,  where  often  seniority  is  linked  to  time  in  grade,  older 
employers  may  feel  a  greater  trepidation  of  technology.  The  unfamiliarity 
of  new  technology  coupled  with  the  projected  fear  of  fatal  errors,  resulting 
in  disciplinary  action  or  even  job  loss  encourages  the  long  and  safe  route 
over  one  that  is  short  and  risk  filled.  The  more  risk  adverse  employees  are 
the  more  unwilling  they  are  to  sacrifice  the  long  and  safe  over  short  and  risk 
filled.  Numerous  stories  are  evident  of  employees  who  seek  to  avoid  new 

56 


Dehlia  Bradshaw  Lynn 

technologies  in  the  workplace.  Organizations  install  sophisticated  scanning 
equipment  only  to  discover  employees  downloading  and  printing  out  copies 
of  materials,  hidden  in  their  desks  or  who  duplicate  electronic  documentation 
systems,  preferring  paper  trails  to  electronic  files.  Implementation  problems 
also  develop  given  the  broad  range  of  educational  levels  and  skill  levels  of  many 
workers,  and  the  limited  power  of  performance  systems  to  overcome  certain 
educational  deficiencies.  Lastly,  systems  design  resistance  is  often  a  response 
of  the  designer's  efforts  to  avoid  centering  on  unique  aspects  of  organizational 
and  individual  performance,  assuming  that  one  size  fits  all. 

Technology  represents  change.  Resistance  to  technology  is  not  only 
resistance  to  innovation  but  also  apprehension,  anticipation  and  acceptance 
of  change.  The  nature  of  organizational  transformation  is  linked  to  the  ability 
of  its  members  to  transition  not  only  systems  associated  with  the  production 
of  work  and  communication  but  also  their  conceptualization  of  the  nature  of 
the  work  they  perform.  This  involves  both  the  learning  of  new  technologies 
and  the  unlearning  of  outdated  and  outmoded  skills.  The  resistance  expressed 
by  employees  can  be  traced  to  two  specific  issues:  technologies'  effect  on 
employment  and  the  impact  of  computing  on  the  quality  of  work  life. 
Examples  of  employee  resistance  to  technology  are  widespread,  giving 
evidence  to  the  reluctance  of  employees  to  support  change.  Staff's  placing 
little  trust  in  automated  systems,  maintaining  old  paper  trails  or  even  creating 
new,  parallel  manual  systems  expresses  mistrust  of  technology.  Poor  "buy-in" 
occurred  recently  in  a  local  health  and  human  service  agency  implementing 
new  technology  to  enable  scanning  of  applications  for  certain  assistance 
programs.  The  system  was  envisioned  to  enable  case  managers  to  input  data 
directly  into  client  files,  providing  for  instantaneous  updating  of  information. 
City  caseworkers,  fearful  of  loosing  information,  maintained  the  original 
paper  forms  in  hidden  file  drawers. 

As  organizations  cope  with  employee  acceptance  of  new  technology, 
employees  struggle  with  issues  of  job  security.  The  replacement  of  people 
by  machines,  or  job  displacement  based  on  office  or  process  automation  has 
been  debated  -  are  there  more  or  less  jobs  after  computing?  While  there  is 
minimal  evidence  to  suggest  that  displacement,  or  the  reduction  of  employees 
based  on  automation  of  manual  activities  actually  occurs,  there  is  a  strong 
sense  among  employees  that  the  dark  side  of  technology  ultimately  risks 
continued  employment  even  with  the  benefits  of  possible  job  expansion  or  job 
creation.  Computers  can  and  do  alter  the  nature  of  work  life;  by  changing  the 
nature  of  social  interaction  among  employees  and  the  nature  of  the  job  skills 
they  possess  and  ultimately  are  awarded  for  performance. 

57 


Innovation,  Technology  and  Municipal  Governments 

New  technologies  often  create  uncertainty  among  employees  who  face  the 
acquisition  of  new  skills  and  increased  comfort  levels  with  overlapping  work 
assignments,  task  responsibilities  and  duties  associated  with  new  professional 
roles.  The  ability  to  determine  individual  employee  performance  is  altering, 
as  new  technologies  in  public  sector  organizations  require  re-examination 
of  traditional  civil  service  systems  performance  measures  linked  to  specific 
tasks  and  outputs.  Today,  new  technologies  point  to  creating  an  environment 
where  performance  is  linked  to  system  functionality,  point  of  delivery  support 
systems  and  performance  centered  vision.  Actual  usability  is  at  the  center  of 
the  work  performance  debate:  testing  of  new  technology  often  occurs  at  the 
implementation  rather  than  at  the  development  stage  placing  employees  at 
perceived  risk.  Funding  limitations  of  government  or  other  public  sector 
technology  projects  places  options  such  as  usability  labs  or  beta-testing 
new  systems  with  actual  users  as  unrealistic  options  for  determining  system 
acceptability.  This  lessens  the  organization's  ability  to  keep  employees 
informed  about  desirable  features  and  ultimately  how  new  systems  will 
improve  quality  and  ease  of  work  performance  (Caudron,  1997).  There  is 
often  little  thought  to  the  nature  of  work  change  facing  individual  employees. 
Assumptions  regarding  the  ability  of  all  employees  to  learn  technology  at  the 
same  rate,  failure  to  adjust  individual  workloads  while  employees  learn  new 
systems  and  believing  that  computers  can  solve  core  personnel  issues  including 
poor  productivity  or  morale  results  in  a  mal-adaptation  in  the  workplace 
leading  "to  increased  mental  workloads,  distortion  of  time,  loss  of  control, 
social  isolation  and  employee  disappointment"  (Brod,  1994,  p.  39). 

Conclusions 

This  paper  has  examined  technological  innovation  and  the  factors 
attributing  to  both  success  and  obstacles  to  technology  in  municipal 
governments  throughout  the  state  of  Maine.  As  the  survey  results  indicate, 
computing  in  these  public  sector  entities  are  embedded  in  key  organizational 
processes.  As  more  and  more  citizens  expect  higher  levels  of  convenience 
and  services  from  local  government,  communities  are  responding  to  these 
demands  with  electronic  services. 

However,  the  impact  of  technology  is  not  just  in  the  electronic  delivery  of 
community  services  but  also  in  the  social  and  organizational  designs  within 
these  organizations.  The  introduction  of  any  technology  into  the  workplace 
must  be  accompanied  by  sensitivity  to  its  impact  on  the  real  human  beings 
that  use  it  (Winslow  and  Bramer,  1998).  The  redesign  of  both  business 
processes  and  information  flow  ideally  incorporates  both  the  technical  system 

58 


Dehlia  Bradshaw  Lynn 

design  (process,  workflow,  and  equipment)  and  the  social  system  design  (roles, 
structures,  and  relationships).  Successful  implementation  is  most  likely  when 
the  people  who  do  the  work  are  involved  in  both  the  technical  and  social 
design  aspects  and  where  individual  and  structural  changes  are  addressed. 
Additionally,  value  systems  of  those  involved  in  organizational  change 
are  critical  to  building  the  support  to  sustain  launching  new  technology. 
"Values,  assumptions  and  beliefs  cut  two  ways;  they  may  offer  access  to  new 
opportunities  at  the  same  time  as  they  may  constrain  particular  behaviors, 
organizational  arrangements,  and  managerial  styles"  (Kolodny,  Liu,  Stymne 
and  Denis,  1996). 

Public  organizations  will  undoubtedly  continue  to  face  pressures  to 
increase  productivity,  improve  the  delivery  of  services  to  clients  and  do  so 
under  increasing  financial  pressures  to  contain  costs.  Technology  does 
offer  a  means  to  bring  about  enhancements  in  productivity  and  efficiency, 
however;  the  strict  "technological  fix"  does  present  important  limitations 
(Chisholm,  1988).  Often  the  promise  has  been  less  than  hoped  for 
(Dixon  et  al.,  1994;  Champy,  1995).  As  survey  results  indicate,  these 
local  governments  are  encountering  barriers  such  as  staffing,  employee 
opposition,  resource  limitations  and  the  lack  of  technology  expertise. 
The  enthusiasm  and  excitement  generated  during  the  formative  stages  of 
technology  implementation  often  becomes  elusive  as  organizations  struggle 
to  accommodate  new  work  patterns,  training  limitations,  vendor  dependence 
and  employee  resistance  to  change.  As  local  governments  experience 
increases  in  technology  expenditures  and  technical  staffing,  and  greater 
demands  for  sophisticated  applications,  creative  alternatives  may  provide 
relief.  Municipalities,  particularly  those  with  limited  resources  should  seek 
opportunities  for  the  development  of  collective  strategies  such  as  consortiums 
or  the  creation  of  special  purpose  districts  providing  greater  economies  of 
scale  for  pilot  projects  and  beta  testing  of  electronic  service  delivery  strategies. 
Successful  efforts  in  transportation,  emergency  services  and  procurement 
provide  proven  models  for  collective  strategies  among  municipalities  seeking 
to  address  technological  innovation. 

Municipalities  less  committed  to  technology  implementation,  with 
lower  levels  of  automation,  relatively  unsophisticated  applications  and 
the  smallest  potential  for  the  routinization  of  computing  experience  the 
greatest  stress  and  lower  payoffs  from  computerization  while  institutions 
with  a  strong  commitment  to  advanced  technology,  resources,  staffing  and 
utilization  experience  the  least  amount  of  stress  associated  with  launching 
new  technologies  (Kraemer  and  King,  1986).  Given  the  contingent  and  often 

59 


Innovation,  Technology  and  Municipal  Governments 

evolutionary  nature  of  determining  the  successes  of  technology,  outcomes 
associated  with  greater  efficiency,  effectiveness  and  responsiveness  are  molded 
not  only  by  citizen  responses,  but  also  by  the  experiences  of  public  managers 
and  employees  who  implement  it,  their  work  settings  and  even  the  nature  of 
individual  work  experiences  as  well. 

References 

Barone,  C.  A.  and  Chickadonz,  G.  H.,  (1991).  "Organizational  transformation: 
Responding  to  technological  innovation,"  in  Ball,  M.J.  et  al  (Eds.),  Healthcare 
Information  Management  Systems  New  York:  Springer- Verlag. 

Berg,  M.  (1998).  The  politics  of  technology:  On  bringing  in  social  theory  into  techno- 
logical design.  (Humans,  Animals  and  Machines).  San  Francisco:  Sage  Publica- 
tions, Inc. 

Brod,  C.  (1994).  Technostress:  The  human  cost  of  the  computer  revolution.  Boston: 
Addison-Wesley  Publishing  Company. 

Brown,  M.M.  and  Brudney,  J.L.  (in  press).  "A  smarter,  better,  faster,  cheaper 

government?  Contracting  for  geographic  information  systems."  Public  Adminis- 
tration Review. 

Brown,  M.M.,  and  Brudney,  J.L.,  (1998).  "Public  sector  information  technology 
initiatives:  implications  for  programs  of  public  administration."  Administration 
and  Society,  Vol  30  No.  4  pp.  421-443. 

Bretschneider,  S.  (1990).  "Management  information  systems  in  public  and  private 
organizations:  An  empirical  test."  Public  Administration  Review  September/ 
October,  Vol  1 1  pp.  536-545. 

Burris,  B.  H.  (1998).  "Computerization  of  the  workplace."  Annual  Review  of  Sociol- 
ogy, Annual  Vol  22  No.l   pp.  141-158. 

Caudron,  S.  (1997).  "The  human  side  of  technology  launch."    Trainingand 
Development,  February  Vol.  51  No.  2  pp.  20-25. 

Caudle,  S.  (1990).  "Managing  information  resources  in  state  government."  Public 
Administration  Review_  September/October  Vol.  11   pp.  515-524. 

Center  for  Technology  in  Government,  University  at  Albany,  Albany,  NY.  (1997). 
Tying  a  Sensible  Knot:  A  Practical  Guide  to  State-Local  Information  Systems. 

Champy,  J.  (1995).  Reengineering  management:  The  mandate  for  new  leadership.  New 
York:  Harper  Business. 

Chisholm,  R.F.  (1988).  "Introducing  advanced  information  technology  into  public 
organizations."  Public  Productivity  Review  Summer  Vol.  1 1  No.4  pp.  39-57. 

Danziger,  J.N.,  Kraemer,  K.L.,  Dunkle,  D.E.,  and  King,  J.L.  (1993).  "Enhancing 
the  quality  of  computing  service:  technology,  structure  and  people."  Public 

60 


Dehlia  Bradshaw  Lynn 

Administration  Review.  March-April  Vol.53  No.  2  pp.  161-169. 

Dixon,  J.R.,  Arnold,  P.,  Heineke,  J.,  Kim,  J.S.,  and  Mulligan,  P.  (1994).  "Business 
process  engineering:  Improving  in  new  and  strategic  directions."  California 
Management  Review  Summer,  pp.  93-108. 

Downs,  A.  (1967).  "A  realistic  look  at  the  final  payoffs  from  urban  data  systems." 
Public  Administration  Review  Vol.77  May/June  pp.  204-210. 

Fletcher,  P.,  Bretschneider,  S.,  Marchand,  D.,  Rosenbaum,  H.,  and  Bertot,  J.C. 

(1992).  Managing  information:  The  county  study.  Syracuse,  NY:  Syracuse  Univer- 
sity. 

General  Accounting  Office  (GAO)  (1997a).  Assessing  risks  and  returns:  A  guide 
for  evaluating  federal  agencies'  IT  investment  decision  making  (GAO/AIMD  — 
10.1.13).  Washington,  DC:  Government  Printing  Office. 

General  Accounting  Office  (GAO). (1997b).  High  risk  areas:  Actions  needed  to  solve 
pressing  management  problems  (GAOIAIMDIGGD-97-60).  Washington,  DC: 
Government  Printing  Office. 

Greenguard,  Samuel  (1998).  "How  technology  will  change  the  workplace."  Work- 
force ]nn.  Vol.77  No.nl  pp.  78-83. 

Grossman,  L.K.(1997).  Technology  Governance:  A  Public  interest  vision  for  the 
telecommunications  age  [On-line]  Available:  http://www.napawash.org 

GS2  Research.  (1997).  Public  Sector  Forecasts  [On-line].  Available:  http:// 
206. 1 84.2 1 3. 145/slg/slgl.htm 

Gurwitt,  R.  (1996).  The  new  data  czars.   Governing  The  Information  Technology 
Reform  Act  of  1996,  Pub.  L.  No.  104-106. 

Hackman,  J.R.  (Ed.).  (1990)  Groups  that  work  (and  those  that  don't).  San  Francisco: 
Jossey-Bass. 

Kling,  R.  (1996).  Computerization  and  Controversy:  Value  Conflicts  and  Social 
Choices.  (2nd  ed.)  San  Diego:  Academic  Press. 

Kling,  R.  (1993).  "Organizational  Analysis  in  Computer  Science."  The  Information 
Society  March-June  Vol.  9  No.  2  pp.  71-87. 

Kraemer,  K.L.,  Dickhoven,  S.,  Fallows-Tierney,  S.,  and  Kling,  J.L.  (1985).  Data- 
wars:  The  Politics  of  modeling  in  federal  policymaking.  New  York:  Columbia 
University  Press. 

Ezell,  M.  (1994)  "The  impact  of  computerization  on  a  nonprofit  child  welfare 
agency."  ARNOVA  Conference  proceedings.  Unpublished  manuscript. 

Information  Technology  in  the  Service  Society:  A  Twenty- First  Century  Lever,  by 
National  Research  Council.  Washington,  DC:  National  Academy  Press. 

Kolodny,  H.,  Liu,  M.,  Stymne,  B.,  and  Denis,  H.(1996).  "New  Technology  and 

61 


Innovation,  Technology  and  Municipal  Governments 

the  emerging  organizational  paradigm."  Human  Relations_  Vol.49  No.  12 
pp.1457-1488. 

Levine,  L.,  &  Mohr,  Bernard  J.  (1988).  "Whole  system  design  (WSD):  The  shifting 
of  attention  and  the  threshold  challenge."  Journal  of  Applied  Behavioral  Science 
September  Vol.34  No.3  pp.  305  -  327. 

Lucas,  H.  C.  (1981).  Implementation:  The  key  to  successful  information  systems.  New 
York:  Columbia  University  Press. 

Marcus,  D.  (1998).  "MIS  and  Technology."  unpublished  paper. 

Northrop,  A.,  Kraemer,  K.L.,  Dunkle,  D.,  and  King,  J. (1990).  "Payoffs  from 
computerization:  lessons  over  time."  Public  Administration  Review  September/ 
October  Vol.  3  No.  1 1  pp.  505-514. 

Orlikowski,  W.  J.  (1993).  "Learning  from  notes:  Organizational  issues  in  groupware 
implementation."  The  Information  Society  Vol.  9  No.  3  July-September  pp. 
237-250. 

Rhodes,  S.  (1998).  "Public  service  inspires  workers  (government  IT  employees)." 
InfoWorld March  30  Vol.  20  No.  13  pp.  79-80. 

Skinner,  W.  (1979).  "The  impact  of  changing  technology  on  the  work  environ- 
ment." In  Kerr,  C.  and  J.M.  Rosow  (Eds.),  Work  in  America:  The  decade  ahead. 
New  York:  D.  Van  Nostrand. 

Synder,  D.  P.  (1996).  "The  revolution  in  the  workplace:  what's  happening  to  our 
jobs?"  The  Futurist.  March-April  Vol.30  No.2  pp.  8-14. 

Stymne,  B.  (1989).  "Teknologisk  determinism  (Technological  determinism)."  In  J. 
Lowstedt  (Ed.).  Organisation  och  tekniforandring  (Organization  and  technological 
change).  Lund:  Student  Literature,  pp.  19-35. 

Sunoo,  B.P.  (1996).  "This  employee  may  be  loafing.  Can  you  tell?  Should  you  care?" 
Personnel  Journal  December    Vol.75  No.  12  pp.  54-62. 

Trist,  E.L.  &  Bamforth,  K.(1951).  "The  social  and  psychological  consequences  of 
the  long  wall  methods  of  coal  getting."  Human  Relations  Vol.  4  pp.  3-38. 

Vallis,  S.P  &  Beck,  J. P.  (1996).  "The  transformation  of  work  revisited:  the  limits 
of  flexibility  in  American  manufacturing."  Social  Problems.  Vol.  43  No.3 
pp.339-361. 

Wasserman,  S.,  &  Faust,  K.  (1994).  Social  network  analysis:  methods  and  applications^ 
New  York:  Cambridge  University  Press. 

Wildavsky,  A.(1983).  "Information  as  an  organizational  problem."  Journal  of  Man- 
agement Studies  Vol.  1  No.  20  pp. 28-40. 

Weick,  K.E.  (1987).  "Organizational  Culture  and  High  Reliability."  California 

62 


Dehlia  Bradshaw  Lynn 

Management  Review  Vol  2  No.  29  pp.  1 12-127. 

Wood,  S.  (1989).  "The  Transformation  of  Work.  "  London:  Allen  &  Unwin. 

Zuboff,  S.  (1985).  "Automate/Informate:  the  two  faces  of  intelligent  technology." 
Organizational  Dynamics  Vol.  2  No.l4  pp.  5-18. 

Notes 

'The  Maine  Municipal  Association  is  a  nonprofit,  non-partisan  organization  whose 
goal  is  to  "provide  a  unified  voice  of  Maine's  municipalities  to  promote  and  strengthen 
local  government"  (MMA,  2001  http:www.memun.org). 

*  The  Edmund  S.  Muskie  School  of  Public  Service  at  USM  offers  graduate  programs 
in  Community  Planning  and  Development,  Health  Policy  and  Management,  and 
Public  Policy  and  Management. 


63 


Utilizing  Technology  to  Revitalize 
And  Modernize  Pi  Gamma  Mu 

Barry  D.  Friedman 
North  Georgia  College  &  State  University 

Pi  Gamma  Mu  is  a  social-science  honor  society  struggling  to  maintain  its 
supply  of  faculty  volunteers  at  the  chapter  level.  The  author  argues  that 
Pi  Gamma  Mu  needs  to  provide  rewards  to  faculty  volunteers  in  order 
to  preserve  the  connections  between  the  honor  society  and  the  faculty 
members.  In  today's  academic  world,  such  rewards  need  to  be  consistent 
with  demands  for  faculty  members  to  publish  and  to  engage  in  innovative 
teaching  methods.  The  author  proposes  that  Pi  Gamma  Mu  encourage 
the  development  of  on-line  social-science  "learning  communities,"  so  that 
faculty  members  may  draw  their  students  into  these  modern  instruments 
of  instruction,  obtain  credit  for  involvement  in  this  innovation,  and  have 
opportunities  to  produce  scholarly  articles  relating  to  this  breakthrough 
in  the  Scholarship  of  Teaching. 

Pi  Gamma  Mu  is  an  honor  society  for  the  social  sciences  that  was  founded 
at  Southwestern  College  in  1924.  There  are  active  chapters  at  170  colleges 
and  universities  in  the  United  States  and  at  two  universities  in  the  Philippine 
Islands.  Over  200,000  persons  have  been  initiated  (Johnston  1999,  pp.  7,  9). 
Pi  Gamma  Mu's  international  constitution  includes  history,  political  science, 
sociology,  anthropology,  economics,  international  relations,  criminal  justice, 
social  work,  social  psychology,  social  philosophy,  history  of  education,  and 
cultural  geography  in  its  definition  of  the  social  sciences. 

This  article  examines  the  forces  that  are  challenging  Pi  Gamma  Mu's  ability 
to  keep  and  attract  faculty  officers  for  its  chapters.  The  article  continues  by 
evaluating  the  usefulness  of  Pi  Gamma  Mu  to  colleges  and  universities  and  to 
the  social-science  community.  Finally,  the  author  proposes  uses  of  technology 
that  may  modernize  the  honor  society  and  create  a  mutually  beneficial 
relationship  between  itself  and  its  faculty  constituency. 

The  Challenge  of  Keeping  and  Attracting  Faculty  Officers 

The  aspiration  of  keeping  existing  Pi  Gamma  Mu  chapters  and  of  creating 
new  chapters  is  threatened  by  a  shortage  of  faculty  members  who  are 
willing  to  hold  the  offices  of  secretary-treasurer  and  faculty  advisor  of  such 

65 


Utilizing  Technology  to  Revitalize  and  Modernize  Pi  Gamma  Mu 

chapters.  Pi  Gamma  Mu  officials  report  that  the  variable  that  best  explains 
or  predicts  the  deactivation  of  a  chapter  is  the  resignation  or  retirement 
of  the  faculty  sponsor:  Obviously,  this  sponsor  was  the  only  or  the  "last" 
faculty  member  at  that  institution  who  was  willing  to  invest  his  time  and 
effort  to  maintaining  the  chapter. 

Faculty  sponsors,  most  of  the  time,  seem  to  find  student  members  to  be 
of  limited  assistance  in  administering  a  Pi  Gamma  Mu  chapter.  When  honor 
students  receive  recognition  from  honor  societies,  they  appear  to  be  thinking, 
"Oh,  so  this  is  what  you  get  when  you  get  good  grades" — as  if  that  must  be 
the  way  it  ought  to  be.  The  students  enjoy  the  attention;  on  the  other  hand, 
they  don't  feel  an  obligation  to  generate  the  recognition  and  the  attention 
themselves.  This  leaves  the  administrative  work  to  the  faculty  officers,  who, 
after  five,  10,  or  20  years  on  the  job,  burn  out. 

In  searching  for  sources  in  the  literature  that  might  provide  a  theoretical 
framework  for  analyzing  this  problem,  two  collections  of  sources  come  to 
mind.  One  literary  collection  would  consider  faculty  sponsors  and  potential 
faculty  sponsors  as  employees  who  need  to  be  compensated  for  doing  the 
work  associated  with  operating  a  Pi  Gamma  Mu  chapter.  Another  literary 
collection  would  consider  faculty  sponsors  and  potential  faculty  sponsors 
as  volunteers.  The  collection  to  be  selected  would  depend  on  whether  it  is 
apparent  that  faculty  sponsors  are  compensated  for  their  efforts,  or  that  their 
supervisors  disregard  their  efforts  on  behalf  of  Pi  Gamma  Mu  in  determining 
how  they  are  to  be  rewarded. 

If  faculty  sponsors  are  being  rewarded  as  generously  for  their  efforts 
on  behalf  of  the  Pi  Gamma  Mu  chapter  as  they  are  for  their  other  job 
responsibilities,  then  the  question  presumably  becomes  a  behavioral  one, 
given  the  freedom  of  choice  that  professors  traditionally  have  in  deciding  for 
themselves  how  to  allocate  their  time.  Is  it  as  enjoyable  to  be  the  faculty  advisor 
of  a  Pi  Gamma  Mu  chapter  as  it  is  to  be  a  member  of  a  university  committee? 
Does  a  faculty  member  derive  as  much  of  a  feeling  of  accomplishment  by 
advising  a  Pi  Gamma  Mu  chapter  as  she  does  by  taking  on  the  responsibility 
of  organizing  the  university's  commencement  ceremony? 

If  this  is  the  approach  to  be  used,  then  the  recruitment  of  faculty  members 
to  serve  as  faculty  officers  of  Pi  Gamma  Mu  chapters  must  depend  on 
persuasive  arguments,  such  as: 

I  "Is  it  fair  to  your  best  students  to  send  them  into  competition  in 
the  work  force  without  honor-society  memberships,  when  their 
peers  at  other  universities  enter  the  competition  with  honor-society 
memberships?" 

66 


Barry  D.  Friedman 

■  "Is  it  healthy  for  your  university  to  provide  no  (or  few)  recognition 
opportunities  to  your  most  capable  students?  Wouldn't  this  lack  of 
recognition  suppress  the  level  of  achievement  of  your  most  capable 
students — thus  driving  down  the  overall  level  of  academic  excellence 
among  your  student  body?" 

These  arguments  work  occasionally,  because  professors  are  notoriously 
concerned  about  the  well  being  of  students.  Not  much  of  the  modern 
pressures  for  research  or  anything  else  seems  to  have  tampered  substantially 
with  professors'  commitment  to  students  at  most  colleges  and  universities. 
Not  much  having  to  do  with  pay  seems  to  have  the  potential  to  disrupt 
professors'  commitment  to  students,  either.  To  some  extent,  attracting  faculty 
members  to  serve  as  chapter  officers  of  an  honor  society  can  be  anchored  to 
the  concept  of  doing  the  right  thing  for  their  students.  As-yet-unaffiliated 
faculty  members  need  to  be  informed  about  (or  "sold"  on)  the  idea  that  their 
best  students  are  being  under-served  if  their  academic  performance  is  not 
fairly  and  publicly  recognized  and  rewarded. 

These  would  be  the  normal  arguments  to  make  in  a  simple,  competitive 
environment,  where  comparable  tasks  compete  for  the  favor  of  faculty 
members.  And  they  may,  in  fact,  have  some  persuasive  value.  In  applying 
pay-as-motivation  theories  to  professors,  one  must  take  into  account  that 
the  training  that  professors  undertook  to  qualify  for  their  positions  would 
ordinarily  attract  substantially  more  compensation,  as  it  would  if  they  went 
to  work  in  industry.  However,  professors  understand  their  careers  to  be  a 
"calling"  that  is  not  based  on  the  creation  of  tangible  commodities  in  exchange 
for  pay  that  reflects  the  value  that  they  added  to  the  goods  produced.  Rather, 
the  professors  seek  the  opportunity  to  enhance  the  lives  of  students;  in  this 
process,  the  professors  have  a  substantial  amount  of  discretion  in  how  they 
will  organize  this  process.  In  many  or  most  cases,  the  professors  also  have  a 
substantial  amount  of  discretion  in  terms  of  what  they  will  deliver  (e.g.,  what 
they  will  teach,  what  topics  to  emphasize,  what  other  topics  to  disregard,  and 
how  to  evaluate  student  performance).  "The  professional  job  involves  many 
choices  of  what  to  do  as  well  as  how  to  proceed.  Generally,  these  must  be  made 
by  the  professional  doing  the  work"  (Sibson  1981,  pp.  189-190).  Bennett 
(1983,  p.  45)  comments,  "Faculty  members  are  notoriously  individualistic. 
Each  faculty  member  prefers  to  go  his  or  her  way — on  course  construction, 
text  selection,  student  evaluation,  and  research  projects.  Each  cites  the 
demands  of  professional  judgment  in  justification."  Only  on  occasion  will 
a  department  head  feel  the  need  to  intervene,  and  this  would  involve  his 
perception  that  departmental  needs  are  not  being  fulfilled.    "...  [T]he 

67 


Utilizing  Technology  to  Revitalize  and  Modernize  Pi  Gamma  Mu 

chairperson  needs  to  create  a  context  and  set  of  circumstances  in  which 
the  faculty  see  their  own  individual  goals  as  achieved  through  meeting  the 
departmental  goals"  (Bennett  1983,  pp.  103-104). 

On  the  other  hand,  there  are  conspicuous  pressures  on  and  signals  sent  to 
professors  that,  to  a  not-insignificant  degree,  circumscribe  their  freedom  to 
manage  their  work  lives  as  they  please.  For  example,  there  is  the  process  by 
which  students  evaluate  their  professors'  performance  in  class.  Frequently, 
these  evaluations  serve  as  inputs  to  the  professors'  annual-evaluation  process, 
which  may  partly  determine  pay  raises.  As  another  example,  there  are 
expectations  from  colleagues  as  well  as  administrators  that  all  faculty  members 
will  share  in  the  necessary  workload  and  in  the  creation  of  essential  outputs. 
At  many  institutions,  publishing  research  is  included  among  these  essential 
outputs;  at  research  universities,  this  requirement  is  essentially  inescapable. 
Expectations  for  service  cause  faculty  members  to  be  active  on  some  number 
of  committees.  At  the  end  of  the  day,  only  a  few  faculty  members  lament  that 
they  don't  have  enough  productive  activities  in  which  to  be  involved. 

In  summary,  faculty  members  are  subject  to  a  mixed-motive  system  of 
motivations  and  interests.  While  pay  raises  may  have  some  impact  on 
behavior,  nevertheless  faculty  members  have  already  shown  a  willingness  to 
sacrifice  pay  potential  and  thus  are  obviously  motivated  by  other  factors. 
Peer  pressure  arguably  is  even  more  significant  than  pay  in  affecting 
faculty  behavior. 

It  has  become  increasingly  and  painfully  apparent  to  Pi  Gamma  Mu's 
international  officers  that  service  to  Pi  Gamma  Mu  is  not  competing  on 
a  level  playing  field  with  other  options  available  to  professors.  The  most 
conspicuous  pressure  on  professors  is  the  demand  that  they  engage  in  research 
that  results  in  presentations  of  papers  at  academic  conferences  and,  better  yet, 
in  publications  that  they  generate,  such  as  scholarly  books  and  journal  articles. 
While  a  department  head  is  apt  to  provide  an  indication  of  appreciation  to  a 
professor  who  advises  the  Pi  Gamma  Mu  chapter,  she  will  probably  express 
considerably  more  approval  to  that  professor — or  some  other  professor — who 
publishes  an  article  in  the  Journal  of  Applied  Psychology.  At  a  research 
university,  it  is  entirely  possible  that  a  department  head  will  admonish  a  faculty 
member  to  "stop  wasting  your  time"  with  honor  societies  and  concentrate  on 
publications.  For  an  as-yet-untenured  professor,  that  instruction  may  come 
with  the  trump  card,  "or  else,"  at  the  end. 

I  honestly  doubt  that  there  is  anything  that  Pi  Gamma  Mu  can  do  to 
overcome  the  "publish-or-else"  atmosphere  of  many  research  universities. 


68 


Barry  D.  Friedman 

In  any  event,  there  are  more  teaching  colleges  and  hybrid  research/ teaching 
institutions  than  there  are  full-fledged  research  universities.  Later  in  this 
paper,  I  will  argue  that  Pi  Gamma  Mu  can  incorporate  in  its  range  of 
activities  scholarly  opportunities  that  may  help  to  satisfy  the  job  requirements 
of  faculty  members  at  the  hybrid  research/teaching  universities  and  the 
teaching  colleges  and,  thus,  to  make  involvement  in  Pi  Gamma  Mu  more 
"productive"  for  the  professor  while  it  generates  benefits  for  honor  students 
in  the  social  sciences. 

If  this  analysis  proceeds,  instead,  on  the  assumption  that  faculty  sponsors 
act  as  volunteers — i.e.,  they  do  not  expect  to  be  rewarded  for  their  efforts  with 
money — there  is  still  a  need  to  cause  the  activity  to  be  rewarding  from  the 
faculty  members'  perspective.  As  Ilsley  (1990,  p.  8)  explains: 

[Because  volunteers'  motives  are  not  solely  or  even  mostly 
altruistic,  vjolunteerism  .  .  .  can  exist  without  altruism.    Purely 
altruistic  individuals,  if  they  did  exist,  might  present  a  problem 
for  volunteer  group  managers,  because  their  motivation  would 
not  be  susceptible  to  organizational  control.     Rather  than 
pretending  that  volunteers  do  not  seek  rewards,  the  wise  manager 
will  concentrate  on  learning  just  what  rewards  they  do  seek. 
This  theoretical  framework  would  require  Pi  Gamma  Mu  to  understand 
that  faculty  sponsors  need  reinforcement.    If  institutions  are  not  rewarding 
faculty  sponsors  with  money,  then  Pi  Gamma  Mu  itself  must  provide  rewards 
to  preserve  its  relationship  with  its  faculty  constituency. 

The  Usefulness  of  Pi  Gamma  Mu 

If  Pi  Gamma  Mu  does  not  deliver  benefits  to  colleges  and  universities,  their 
faculties,  and  their  students,  further  analysis  of  this  problem  would  be  of  little 
value.  Indeed,  the  international  officers  of  Pi  Gamma  Mu  sometimes  hear 
arguments  that  this  is  the  case.  For  example,  one  expression  of  skepticism  says 
that  the  existence  of  discipline-specific  honor  societies — such  as  Alpha  Kappa 
Delta  (sociology),  Phi  Alpha  Theta  (history),  and  Pi  Sigma  Alpha  (political 
science) — obviates  the  need  for  an  interdisciplinary  honor  society  for  social 
science.  If  a  student  is  being  initiated  into  Psi  Chi  (psychology),  the  argument 
goes,  then  initiation  into  Pi  Gamma  Mu,  too,  is  superfluous. 

To  each  his  own,  of  course,  but  this  author's  observations  and  experiences 
convince  him  that  this  argument  is  not  only  faulty  but,  furthermore, 
carries  a  now-obsolete  preference  for  discipline-specific  study  rather  than 
interdisciplinary  learning  and  experience.  The  traditional  curriculum, 
wherein  a  student  takes  a  few  courses  in  English  literature,  a  few  courses  in 

69 


Utilizing  Technology  to  Revitalize  and  Modernize  Pi  Gamma  Mu 

mathematics,  a  few  courses  in  science,  and  one  course  after  another  in  her 
major,  is  coming  under  withering  attack.  Here  is  one  such  challenge: 
Large,  impersonal,  bureaucratic,  and  fragmented,  the 
American  college  is  often  an  educational  community  only  in 
theory.  A  variety  of  factors  make  the  notion  of  meaningful 
educational  community — the  root  of  the  word  "college" — elusive 
in  many  of  our  institutions.  .  .  .  [In  t]he  idealized  version 
of  the  campus  of  the  past,  .  .  .  students  and  faculty  shared 
a  close  and  sustained  fellowship,  where  day-to-day  contacts 
reinforced  previous  classroom  learning,  .  .  .  the  curriculum 
was  organized  around  common  purposes,  and  the  small  scale 
of  the  institution  promoted  active  learning,  discussion,  and 
individuality.  .  .  . 

Many  institutions  today  have  little  in  common  with  the 

campus  of  the  past.    With  huge  enrollments,  diverse  students 

and  faculty,  competing  missions,  an  increasing  number  of 

part-time  faculty  and  students,  and  enormous  specialization 

and  fragmentation  in  the  curriculum,  many  institutions  are  not 

experienced  by  students  or  faculty  as  an  educational  community 

at  all.   In  many  places,  the  institution  can  no  longer  even  begin 

to  assume  responsibility  for  creating  community  (Gabelnick 

etal.,  1990,  pp.  9-10). 

Interdisciplinary  learning,  as  in  the  form  of  "learning  communities,"  and 

curricula  that  focus  on  outcomes  rather  than  the  completion  of  prescribed 

courses  are  touted  now  as  the  far  more  productive  mode  of  educating  students 

for  their  benefit  rather  than  educating  them  in  order  to  gratify  professors 

who  find  personal  comfort  in  isolating  themselves  and  their  students  from 

other  disciplines.1  As  Swiss  (1991,  pp.  139-140)  would  put  it,  learning 

communities  are  more  apt  to  focus  on  the  outputs  (also  known  as  outcomes) 

of  the  university's  effort  rather  than  inputs  or  processes  (also  known  as 

throughputs);  the  emphasis  on  outcomes  is  more  likely  to  produce  valuable 

results.    In  this  context,  Pi  Gamma  Mu  has  placed  itself  (or,  less  charitably, 

one  might  say,  "has  luckily  stumbled")  into  a  most  propitious  niche:  an  arena 

for  interdisciplinary  interaction  and  learning. 

The  other  part  of  my  argument  against  the  preference  for  separating  the 
disciplines  is  based  on  my  experience  with  the  model  of  cooperation  among 
honor  societies.  At  North  Georgia  College  &  State  University  (NGCSU), 
there  are  16  honor  societies  affiliated  with  the  Council  of  Honor  Societies.2 
Most  of  the  honor  societies  find  themselves  thriving  with  the  cooperation. 

70 


Barry  D.  Friedman 

The  number  of  annual  initiation  banquets  that  are  necessary  has  been  slashed 
because  of  the  council's  Honor  Societies'  Initiation  Banquet,  which  tends 
to  reduce  the  workload  of  honor-society  advisors  by  virtue  of  reducing 
the  number  of  banquets  that  they  must  organize.  Other  cooperative 
efforts  have  strengthened  the  discipline-specific  honor  societies.  Here 
is  a  case  in  point: 

NGCSU's  Phi  Alpha  Theta  chapter  has  always  been  an 
enthusiastic  affiliate  of  the  university's  Council  of  Honor 
Societies  and  a  good  partner  with  the  Pi  Gamma  Mu  chapter. 
In  the  spring  of  200 1 ,  that  Phi  Alpha  Theta  chapter  found  yet 
a  new  reason  to  appreciate  its  connection  with  Pi  Gamma  Mu 
and  its  affiliation  with  the  council.  The  members  of  Phi  Alpha 
Theta  were  working  on  a  project  to  raise  money  to  help  build 
the  World  War  II  memorial  site  in  Washington,  D.  C.  Their 
goal  was  $1000,  at  which  level  the  chapter  would  be  recognized 
in  the  commemorative  book  that  will  be  distributed  when  the 
memorial  is  dedicated.  After  months  of  exhausting  fund  raising, 
they  had  accumulated  $625,  and  Dr.  Georgia  A.  Mann,  their 
faculty  advisor,  pleaded  with  them  to  concede  the  $1000  goal, 
which  seemed  beyond  reach,  and  to  comfort  themselves  that 
they  had  raised  a  substantial  amount  of  money  nonetheless.  Dr. 
Mann  asked  me  for  a  check  in  the  amount  of  $625  (as  executive 
director  of  the  Council  of  Honor  Societies,  I  hold  funds  for  about 
seven  of  the  affiliated  honor  societies  in  a  checking  account),  and 
told  me  about  the  disappointment  of  the  members.  I  suggested 
to  her  that  she  remember  the  purpose  of  the  council,  and  ask 
for  support  from  the  other  social-science  honor  societies.  Pi 
Gamma  Mu  donated  $150,  the  new  chapter  of  Alpha  Kappa 
Delta  (sociology)  donated  $75,  Alpha  Phi  Sigma  (criminal 
justice)  donated  $75,  and  Pi  Sigma  Alpha  (political  science) 
donated  $75 — for  a  grand  total  of  $1000!  The  members  of  Phi 
Alpha  Theta  were  ecstatic — even  if  they  had  to  share  some  of  the 
credit! — and  exulted  about  it  publicly  during  their  part  of  the 
program  of  the  Honor  Societies'  Initiation  Banquet. 
This  author  argues  vehemently  that  interdisciplinary  honor  societies  and 
cooperation  among  honor  societies  are  preferable  forms  of  organization, 
compared  to  reliance  on  discipline-specific  honor  societies  that  must 
be  self-reliant.  Furthermore,  the  discipline-specific  honor  societies  are 
arguably  less  capable  of  providing  interdisciplinary-learning  opportunities 

71 


Utilizing  Technology  to  Revitalize  and  Modernize  Pi  Gamma  Mu 

than  an  interdisciplinary  honor  society  like  Pi  Gamma  Mu  has  the  ability 
to  promote. 

Securing  Pi  Gamma  Mu's  Advantages 
Through  the  Use  of  Technology 

One  of  the  modern  emphases  in  higher  education  involves  the  creation  of 
"learning  communities"  of  scholars  on  one  or  more  university  campuses.  In 
the  definition  of  Gabelnick  et  al.  (1990,  p.  5): 

Learning  communities  .  .  .  purposefully  restructure  the 
curriculum  to  link  together  courses  or  course  work  so  that 
students  find  greater  coherence  in  what  they  are  learning  as 
well  as  increased  intellectual  interaction  with  faculty  and  fellow 
students.  .  .  .  [L]  earning  communities  are  also  usually  associated 
with  collaborative  and  active  approaches  to  learning,  some  form 
of  team  teaching,  and  interdisciplinary  themes. 
Because  these  learning  communities  tend  to  be  interdisciplinary, 
participants  with  a  diversity  of  academic  backgrounds  can  trade  ideas  and 
compare  a  variety  of  critical-thinking  approaches  to  problem  solving. 

Palloff  and  Pratt  describe  on-line  learning  communities — i.e.,  learning 
communities  in  which  the  interaction  takes  place  aboard  the  Internet.  In 
some  of  these  learning  communities,  interaction  is  "synchronous" — i.e., 
the  participants  log  in  to  the  Web  site  at  a  prearranged  time  and  discuss 
course  content  simultaneously.  In  most  learning  communities,  interaction  is 
"asynchronous" — i.e.,  the  participants  log  in  to  the  Web  site  at  any  time  of 
the  day,  subject  only  to  an  eventual  deadline,  and  post  messages  on  a  bulletin 
board- type  of  instrument  for  discussion  (1999,  p.  4). 

The  office  of  the  chancellor  of  the  University  System  of  Georgia  has 
devoted  a  great  deal  of  resources  to  encourage  the  development  of  learning 
communities.  In  response  to  this  emphasis,  this  author  was  a  founding 
member  of  one  of  the  first  such  learning  communities  at  North  Georgia 
College  &  State  University.  During  the  fall  semester  of  2000,  two  nursing 
professors  and  I  brought  our  students  into  a  learning  community  on  the 
topic  of  "Health  Care,  Public  Policy,  and  Ethics."  My  students  were  enrolled 
in  an  M.P.A.  course  in  public  policy  analysis.  The  nursing  students  included 
those  pursuing  an  associate's  degree  in  nursing  (Prof.  Barbara  Ann  Tronsgard's 
students)  and  those  pursuing  a  master's  degree  in  nursing  (Dr.  Toni  O. 
Barnett's  students).  We  used  WebCT  on-line  course  software.  The  three 
courses  otherwise  took  the  same  form  that  they  would  ordinarily  have,  but 
we  added  the  learning-community  component.    This  component  operated 

72 


Barry  D.  Friedman 

in  two  phases.  During  the  first  phase,  I  wrote  and  posted  an  essay  entitled 
"Plagiarism."3  During  a  two-week  period,  each  student  was  required  to  read 
my  essay  and  then  to  post  a  comment  reacting  to  the  essay.  In  the  one-week 
period  that  immediately  followed,  each  student  was  required  to  post  a 
reply  to  the  comment  of  a  student  in  a  different  class.  During  the  second 
phase,  I  wrote  and  posted  an  essay  entitled,  "Policy  and  Economics  of  the 
Health-Care  System."  The  students  were  required  to  repeat  the  same  process 
of  posting  comments  and  replying  to  each  other.  The  three  participating 
professors  were  delighted  with  the  interaction  among  the  nursing  and 
political  science  students. 

During  the  spring  semester  of  200 1 ,  the  three  professors  agreed  to  bring 
their  students  into  another  learning  community,  but  this  time  we  brought 
two  more  professors  and  their  students  into  the  community.  Both  of  them  are 
members  of  Pi  Gamma  Mu,  as  I  am,  so  that  we  now  had  three  social-science 
professors  along  with  the  two  nursing  professors.  This  author  was  teaching 
an  undergraduate/graduate  course  about  the  U.  S.  presidency.  Dr.  Thomas 
W.  De  Berry  was  teaching  an  undergraduate  course  in  microeconomics. 
Dr.  Rufus  Larkin  was  teaching  a  graduate  course  in  community  counseling. 
The  theme  of  this  learning  community  was  "Public-Policy  Formulation 
of  U.  S.  Government-Provided  Health-Insurance  Programs  in  the  New 
Administration."  The  first  essay,  co-authored  by  Barnett  and  me,  was  entitled 
"Government-Provided  Prescription-Drug  Coverage."  The  second  essay, 
co-authored  by  Tronsgard  and  me,  was  entitled  "What  Should  the  Bush 
Administration  Do  About  Prescription-Drug  Coverage?  What  Will  It  Do?" 
The  interaction  among  the  five  groups  of  students  was  even  more  animated 
than  that  involving  the  fall-semester  group.  The  interaction  was  reminiscent 
of  the  way  in  which  college  students  interacted  in  a  previous  era;  Gabelnick  et 
al.  (1990,  p.  10)  contrast  college  life  of  yesterday  and  today: 

As  the  number  of  full-time  and  residential  students  declines, 
community-creating  activities  such  as  late-night  dorm  sessions, 
hours  spent  lingering  in  a  favorite  coffee  shop,  or  study  break 
arguments  in  a  library  lounge  also  decline.  For  many  students, 
the  time  and  spaces  for  trying  out  new  ideas  in  the  company 
of  peers  no  longer  exists.  The  college  experience  is  sandwiched 
between  work  and  family,  and  the  set  of  classes  taken  during 
any  given  term  constitutes  the  only  sustained  contact  students 
have  with  their  colleges.  In  this  environment,  the  curriculum 
must  now  assume  responsibilities  for  building  community  formerly 


73 


Utilizing  Technology  to  Revitalize  and  Modernize  Pi  Gamma  Mu 

assumed  by  the  college  as  a  whole  (emphasis  is  preserved  from 
the  original). 

During  the  vacation  between  the  fall  semester  of  2000  and  the  spring 
semester  of  2001 ,  the  two  students  who  serve  on  Pi  Gamma  Mu's  international 
board  of  trustees — Lisa  Contreras  and  Nilda  Pyronneau — initiated  their 
own  version  of  the  learning  community.  They  sent  an  E-mail  message  to 
numerous  chapter  advisors,  and  invited  them  to  share  opinions  about  the 
continuing  mystery  surrounding  whether  Vice  President  Al  Gore  or  Texas 
Governor  George  W.  Bush  had  won  the  2000  presidential  election.  To  the 
delight  of  Contreras  and  Pyronneau,  a  spirited  discussion  arose.  A  pattern 
was  emerging:  Pi  Gamma  Mu  members  in  various  departments  at  NGCSU, 
and  Pi  Gamma  Mu  members  on  a  variety  of  campuses,  were  engaging  in 
discussions  about  issues  of  social  science!  This  was  an  innovation  that 
Contreras,  De  Berry,  Larkin,  Pyronneau,  and  I  do  not  want  to  be  abandoned. 
We  consider  it  very  desirable  (and,  I  will  soon  argue,  it  is  essential)  that  these 
inter-institutional  and  interdepartmental  initiatives  continue. 

Feedback  from  the  students  showed  more  enthusiasm  than  skepticism 
relative  to  the  learning-community  activity.  For  the  professors — besides  the 
satisfaction  that  we  derived  from  watching  our  students  learn  with  and  from 
each  other — the  opportunities  for  scholarship,  professional  development,  and 
service  became  apparent.  One  of  the  participating  faculty  members  presented 
a  paper  co-authored  by  three  of  the  faculty  members  (Barnett  et  al.  2001)  at 
a  professional  conference.  Three  of  the  faculty  members  made  a  presentation 
at  an  assembly  of  the  NGCSU  faculty.  Dr.  Judy  S.  O'Neal,  chairperson  of 
the  university's  Curriculum  and  Technology  Committee,  praised  the  work  of 
the  faculty  members  as  being  groundbreaking. 

Pi  Gamma  Mu  has  an  opportunity  to  foster  the  development  of  these 
learning  communities  on  individual  campuses  through  its  chapters,  and  then 
to  interconnect  chapters  and  campuses  through  inter-institutional  learning 
communities.  The  honor  society  can  and  must,  for  the  sake  of  its  growth  if 
not  its  very  survival,  lead  this  activity.  By  doing  so,  it  has  the  potential  to 
establish  itself  as  a  force  that  strengthens  its  faculty  constituents  rather  than 
burdening  them.  It  has  the  potential  to  establish  itself  as  a  trailblazing  force 
in  promoting  scholarship  in  social  science,  rather  than  an  entity  that  has 
a  parasitic  effect  on  university  social-science  divisions.  In  the  language  of 
marketing  (see  e.g.,  Kotler  and  Andreasen,  1996,  pp.  40-41),  Pi  Gamma 
Mu  has  an  opportunity  to  deliver  what  its  target  market  eagerly  wants  rather 
than  to  plead  with  its  target  market  to  accept  what  it  wants  to  provide.  The 
potential  energy  can  transform  Pi  Gamma  Mu  into  an  envied  position  of 

74 


Barry  D.  Friedman 

leadership.  What  every  learning  community  needs  is  "stable  leadership  and  an 

administrative  home."  As  Gabelnick  et  al.  (1990,  p.  41)  state: 

If  an  administrator  acts  as  the  coordinator  of  the  project  and 
assumes  responsibilities  for  logistics,  the  faculty  can  concentrate 
on  curriculum  development,  instruction,  and  evaluation.  Faculty 
are  usually  grateful  for  the  assistance,  but  the  downside  of  this 
largess  is  that  the  faculty  may  never  develop  the  administrative 
savvy  to  manage  the  learning  community.  Still,  an  administra- 
tive point  person  who  models  a  collaborative  management 
style,  alerts  faculty  to  curricular  quagmires,  and  smoothes 
administrative/staff  networks  is  an  invaluable  resource.  Obviously 
the  best  arrangement  is  a  partnership  of  administrators  and 
faculty  who  meet  regularly  to  consider  important  learning 
community  issues. 
Pi  Gamma  Mu  has  the  opportunity  to  occupy  this  position  as  the 

administrative  home — the  anchor — for  innovative  inter-institutional  learning 

communities.  This  opportunity  should  not  be  lost. 

Notes 

1.  Swiss  (1991,  p.  90)  refers  to  "goal  displacement,"  an  approach  to  organizing 
work  such  that  "an  organization  or  its  members  begin  to  pursue  goals  other  than  the 
proper'  organizational  ones.  .  .  .  [T]he  organization  is  being  run  as  if  the  goal  were 
the  comfort  of  the  employees  rather  than  the  benefit  of  the  public." 

2.  Information  about  the  council  may  be  accessed  at  this  URL  address: 
http://l68.30.200.21/-CHonorSo/index.htm  .  This  site  links  to  the  Web  sites  of  Pi 
Gamma  Mu  and  numerous  other  honor  societies. 

3.  This  article  may  be  accessed  at  this  URL  address:  http://www.NGCSU.edu/ 
academic/Bus_Gov/Ps_cj/bfriedman/plgrm.htm  . 

References 

Barnett,  Toni  O.;  Friedman,  Barry  D.;  and  Tronsgard,  Barbara  Ann  (2001).  "Creat- 
ing a  Community  of  Scholars  at  North  Georgia  College  &  State  University." 
Conference  paper  presented  at  Annual  Meeting  of  the  Georgia  Political  Science 
Association,  Hilton  Head  Island,  S.  C.  February  23-24. 

Bennett,  John  B.  (1983).  Managing  the  Academic  Department:  Cases  and  Notes. 
New  York:  American  Council  on  Education. 

Gabelnick,  Faith;  MacGregor,  Jean;  Matthews,  Roberta  S.;  and  Smith,  Barbara 
Leigh  (1990).  Learning  Communities:  Creating  Connections  Among  Students, 
Faculty,  and  Disciplines.  San  Francisco:  Jossey-Bass  Inc. 


75 


Utilizing  Technology  to  Revitalize  and  Modernize  Pi  Gamma  Mu 

Ilsley,  Paul  J.  (1990).  Enhancing  the  Volunteer  Experience:  New  Insights  on 

Strengthening  Volunteer  Participation,  Learning,  and  Commitment.  San  Francisco: 
Jossey-Bass  Inc. 

Johnston,  Scott  D.  (1999).  Pi  Gamma  Mu  International  Honor  Society  in  Social 
Science:  First  75  Years.  Winfield,  Kans.:  Pi  Gamma  Mu. 

Kotler,  Philip,  and  Andreasen,  Alan  R.  (1996).  Strategic  Marketing  for  Nonprofit 
Organizations.  5th  ed.  Upper  Saddle  River,  N.  J.:  Prentice  Hall. 

Palloff,  Rena  M.,  and  Pratt,  Keith  (1999).  Building  Learning  Communities  in  Cyber- 
space: Effective  Strategies  for  the  Online  Classroom.  San  Francisco:  Jossey-Bass 
Inc. 

Sibson,  Ronald  E.  (1981).   Compensation.  Rev.  ed.  New  York:  AMACOM. 

Swiss,  James  E.  (1991).  Public  Management  Systems:  Monitoring  and  Managing- 
Government  Performance.  Englewood  Cliffs,  N.  J.:  Prentice  Hall 


76 


ISBN:  1-883199-14-X