Minecraft Adventures B2G1 Free
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    Original Essays | August 14, 2015

    Roxanne Dunbar-Ortiz: IMG The Blind Spot of United States History



    The most frequent question readers ask about An Indigenous Peoples' History of the United States is "Why hasn't this book been written before?" I'm... Continue »
    1. $11.20 Sale Trade Paper add to wish list

    spacer

On Order

$23.95
New Trade Paper
Currently out of stock.
Add to Wishlist
available for shipping or prepaid pickup only
Qty Store Section
- Local Warehouse Business- Management

The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Tru

by

The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Tru Cover

 

Synopses & Reviews

Publisher Comments:

The misuse of an organization's information systems by employees, whether through error or by intent, can result in leaked and corrupted data, crippled networks, lost productivity, legal problems, and public embarrassment. As organizations turn to technology to monitor employee use of network resources, they are finding themselves at odds with workers who instinctively feel their privacy is being invaded. The Visible Employee reports the results of an extensive four-year research project, covering a range of security solutions for at-risk organizations as well as the perceptions and attitudes of employees toward monitoring and surveillance. The result is a wake-up call for business owners, managers, and IT staff, as well as an eye-opening dose of reality for employees.

Synopsis:

For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers—either through error or by intent—is discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security solutions for at-risk organizations but also the perceptions and attitudes of employees toward workplace surveillance.

About the Author

Jeffrey M. Stanton is an associate professor in the school of information studies at Syracuse University. His work has been published in Human Performance, International Journal of Human-Computer Interaction, Information Technology and People, Journal of Applied Psychology, Journal of Information Systems Education, and Personnel Psychology. He is the recipient of the National Science Foundation's CAREER award. He lives in Jamesville, New York. Kathryn R. Stam is an assistant professor of anthropology at the SUNY Institute of Technology-Utica. She is a founding member and the associate director of the Syracuse Information Security Evaluation (SISE) project. Her research has appeared in Journal of Digital Information, Journal of Information Systems Education, and World Health Forum. She lives in New Hartford, New York.

Product Details

ISBN:
9780910965743
Subtitle:
Without Compromising Employee Privacy or Trust
Author:
Stanton, Jeffrey M.
Manufactured:
Information Today Inc
Author:
Stam, Kathryn R.
Publisher:
Information Today, Inc.
Subject:
General
Subject:
Management
Subject:
Human Resources & Personnel Management
Subject:
Supervision of employees
Subject:
General Computers
Subject:
Information resources management
Subject:
Privacy, right of
Subject:
Business management
Edition Description:
Trade Paper
Publication Date:
20060601
Binding:
Electronic book text in proprietary or open standard format
Language:
English
Pages:
272
Dimensions:
9 x 6 x 0.8 in 1.12 lb

Other books you might like

  1. Identity Crisis; How Identification... New Trade Paper $6.97
  2. E Commerce Security Used Trade Paper $0.50
  3. Technology and privacy : the new... Used Hardcover $7.50

Related Subjects

» Business » Human Resource Management
» Business » Management
» Metaphysics » General
» Science and Mathematics » Biology » General
» Transportation » Aviation » General

The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Tru New Trade Paper
0 stars - 0 reviews
$23.95 Backorder
Product details 272 pages Information Today, Inc. - English 9780910965743 Reviews:
"Synopsis" by ,
For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers—either through error or by intent—is discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security solutions for at-risk organizations but also the perceptions and attitudes of employees toward workplace surveillance.

spacer
spacer
  • back to top

FOLLOW US ON...

       
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.