The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets - Without Compromising Employee Privacy or Trustby Jeffrey M. Stanton, Kathryn R. Stam
Pub. Date: 06/01/2006
Publisher: Information Today, Inc.
For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workerseither through error or by intentis discussed in detail, as are possible
For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workerseither through error or by intentis discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security solutions for at-risk organizations but also the perceptions and attitudes of employees toward workplace surveillance.
- Information Today, Inc.
- Publication date:
- Edition description:
- New Edition
- Product dimensions:
- 6.00(w) x 9.00(h) x 0.80(d)
Table of Contents
Foreword, by Gurpreet Dhillon,
CHAPTER 1 An Introduction to Information Protection and Employee Behavior,
CHAPTER 2 How Employees Affect Information Security,
CHAPTER 3 Information Security Technologies and Operations,
CHAPTER 4 Employee Monitoring, Surveillance, and Privacy,
CHAPTER 5 Managerial Perspectives,
CHAPTER 6 Information Technology Professionals' Perspectives,
CHAPTER 7 Employee Perspectives on Information Security and Privacy,
CHAPTER 8 Overall Analysis and Interpretation,
CHAPTER 9 Recommendations for Managers, Employees, and Information Security Professionals,
Appendix A: Recommended Reading,
Appendix B: Discussion Questions,
Appendix C: Employee Security-Related Behavior List,
Appendix D: Leadership Interview Protocol,
Appendix E: Information Security Professional Interview Protocol,
Appendix F: Employee Interview Protocol,
Appendix G: Straightforward Acceptable Use Policy,
Appendix H: Straightforward Password Policy,
About the Authors,
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >
I was expecting a pro-management book that basically said how to do more surveillance without getting caught by employees. But this book takes into account the employees point of view. Also has a great non-technical description of information security concepts. I'm going to buy another copy for my boss.
'The Visible Employee' presents the results of a four-year research project concerning prevailing workplace security measures and their side effects. On the one hand, deliberate or accidental employee misuse of information systems can cause havoc on the other, too much monitoring and surveillance of employees can provoke conflict on all levels of hierarchy and cause drag on the efficiency of a business. Chapters present the perspectives of Information Technology professionals, managerial perspectives, employee perspectives, the pros and cons of different approaches to the quandary of balancing security against efficiency, and much more. Numerous appendices from employee interview protocol to a recommended password policy ('never use a dictionary word for a password' or 'never send a password using email') and an index round out this valuable guide to businesses trying to successfully compete in a rapidly evolving and interconnected world.