The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets - Without Compromising Employee Privacy or Trust

The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets - Without Compromising Employee Privacy or Trust

5.0 2
by Jeffrey M. Stanton, Kathryn R. Stam
     
 

ISBN-10: 0910965749

ISBN-13: 9780910965743

Pub. Date: 06/01/2006

Publisher: Information Today, Inc.


For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers—either through error or by intent—is discussed in detail, as are possible…  See more details below

Overview


For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers—either through error or by intent—is discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security solutions for at-risk organizations but also the perceptions and attitudes of employees toward workplace surveillance.

Product Details

ISBN-13:
9780910965743
Publisher:
Information Today, Inc.
Publication date:
06/01/2006
Edition description:
New Edition
Pages:
272
Product dimensions:
6.00(w) x 9.00(h) x 0.80(d)

Table of Contents

Contents

Copyright,
Foreword, by Gurpreet Dhillon,
Acknowledgments,
Preface,
CHAPTER 1 An Introduction to Information Protection and Employee Behavior,
CHAPTER 2 How Employees Affect Information Security,
CHAPTER 3 Information Security Technologies and Operations,
CHAPTER 4 Employee Monitoring, Surveillance, and Privacy,
CHAPTER 5 Managerial Perspectives,
CHAPTER 6 Information Technology Professionals' Perspectives,
CHAPTER 7 Employee Perspectives on Information Security and Privacy,
CHAPTER 8 Overall Analysis and Interpretation,
CHAPTER 9 Recommendations for Managers, Employees, and Information Security Professionals,
References,
Appendix A: Recommended Reading,
Appendix B: Discussion Questions,
Appendix C: Employee Security-Related Behavior List,
Appendix D: Leadership Interview Protocol,
Appendix E: Information Security Professional Interview Protocol,
Appendix F: Employee Interview Protocol,
Appendix G: Straightforward Acceptable Use Policy,
Appendix H: Straightforward Password Policy,
About the Authors,
Index,

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >