The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust

Nonfiction, Computers, General Computing
Cover of the book The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust by Jeffrey M. Stanton, Kathryn R. Stam, Information Today, Inc.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jeffrey M. Stanton, Kathryn R. Stam ISBN: 9781937290696
Publisher: Information Today, Inc. Publication: June 1, 2006
Imprint: Information Today, Inc. Language: English
Author: Jeffrey M. Stanton, Kathryn R. Stam
ISBN: 9781937290696
Publisher: Information Today, Inc.
Publication: June 1, 2006
Imprint: Information Today, Inc.
Language: English

For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers-either through error or by intent-is discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security solutions for at-risk organizations but also the perceptions and attitudes of employees toward workplace surveillance.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers-either through error or by intent-is discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security solutions for at-risk organizations but also the perceptions and attitudes of employees toward workplace surveillance.

More books from Information Today, Inc.

Cover of the book Caribbean Libraries in the 21st Century by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book Library Relocations and Collection Shifts by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book The Accidental Systems Librarian, Second Edition by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book Buying and Selling Information by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book Smart Services: Competitive Information Strategies, Solutions, and Success Stories for Service Businesses by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book The Cybrarian's Web: An AZ Guide to 101 Free Web 2.0 Tools and Other Resources by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book Research on Main Street: Using the Web to Find Local Business and Market Information by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book The Accidental Data Scientist by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book Social Software in Libraries: Building Collaboration, Communication, and Community Online by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book Web of Deceit by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book The Traveler's Web: An Extreme Searcher Guide to Travel Resources on the Internet by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book 21 Days to Success Through Networking by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book Net Effects by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book The Librarian's Guide to Negotiation: Winning Strategies for the Digital Age by Jeffrey M. Stanton, Kathryn R. Stam
Cover of the book The Accidental Taxonomist by Jeffrey M. Stanton, Kathryn R. Stam
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy