did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780910965743

The Visible Employee Using Workplace Monitoring and Surveillance to Protect Information Assets—Without Compromising Employee Privacy or Trust

by ;
  • ISBN13:

    9780910965743

  • ISBN10:

    0910965749

  • Format: Paperback
  • Copyright: 2006-06-01
  • Publisher: CyberAge Books
  • Purchase Benefits
List Price: $26.61

Summary

For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workerseither through error or by intentis discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security solutions for at-risk organizations but also the perceptions and attitudes of employees toward workplace surveillance.

Author Biography

Jeffrey M. Stanton is an associate professor in the school of information studies at Syracuse University. His work has been published in Human Performance, the International Journal of Human-Computer Interaction, Information Technology and People, the Journal of Applied Psychology, The Journal of Information Systems Education, and Personnel Psychology. He is the recipient of the National Science Foundation's CAREER award. He lives in Jamesville, New York. Kathryn R. Stam is an assistant professor of anthropology at the SUNY Institute of Technology—Utica. She is a founding member and the associate director of the Syracuse Information Security Evaluation (SISE) project. Her research has appeared in the Journal of Digital Information, The Journal of Information Systems Education, and World Health Forum. She lives in New Hartford, New York.

Table of Contents

Foreword, by Gurpreet Dhillon xi
Acknowledgments xiii
Preface xv
CHAPTER 1 An Introduction to Information Protection and Employee Behavior 1(10)
A Note About Terminology
9(2)
CHAPTER 2 How Employees Affect Information Security 11(28)
An Information Security Overview
12(10)
Security Implications of Employee
Information Technology Usage
22(15)
Summary: Employees—Both a Vulnerability and a Resource
37(2)
CHAPTER 3 Information Security Technologies and Operations 39(24)
Security Technology Overview
39(7)
Protection Technologies for Use on the Inside
46(15)
Summary: Two Pitfalls of Employee Monitoring
61(2)
CHAPTER 4 Employee Monitoring, Surveillance, and Privacy 63(20)
Laws Affecting Security and Privacy
64(4)
Analyzing Privacy at Work
68(3)
Privacy as Control over Personal Information
71(3)
Privacy and Trust
74(2)
Privacy and Fairness
76(3)
The Zone of Acceptance
79(1)
Information Privacy in the Workplace: Three Factors and the Zone
80(3)
CHAPTER 5 Managerial Perspectives 83(42)
Managers' Attitudes Toward Information Technology
85(10)
Managers' Beliefs About Information Security
95(16)
Managerial Perspectives on Employee Monitoring
111(6)
Statistical Studies of Managers and Security
117(8)
CHAPTER 6 Information Technology Professionals' Perspectives 125(38)
Influencing User Behavior
134(3)
Security Policies
137(3)
Communication
140(5)
Training
145(3)
Monitoring
148(5)
Leader Priorities
153(4)
Survey of Information Technology Professionals
157(3)
Information Technology Professionals' Perspectives on Security and Privacy
160(3)
CHAPTER 7 Employee Perspectives on Information Security and Privacy 163(64)
Background: Employee Beliefs About Information Technology and Security
167(23)
Vulnerabilities: Users' Perceptions of Barriers to Positive Security Practices
190(9)
User Perspectives on Training, Policy, and Monitoring
199(8)
Employee Perspectives on Workplace Monitoring
207(9)
Overall Recap of Interview Data
216(1)
A Survey of Employee Beliefs and Information Security
217(10)
CHAPTER 8 Overall Analysis and Interpretation 227(26)
Priorities for Information Security
228(3)
Computer-Related Behavior of Employees/Users
231(2)
Communication Among Different Groups in the Organization
233(2)
Policies, Training, and Behavioral Influences
235(5)
Electronic Monitoring and Surveillance Rights
240(2)
Organizational Cycles of Monitoring and Security
242(8)
Complex Security Risks in Organizations
250(3)
CHAPTER 9 Recommendations for Managers, Employees, and Information Security Professionals 253(22)
The Main Message: Transparent Security Governance
254(11)
Resistance to Organizational Change
265(7)
Promoting Insider Integrity
272(3)
References 275(22)
Appendix A: Recommended Reading 297(8)
Appendix B: Discussion Questions 305(8)
Appendix C: Employee Security-Related Behavior List 313(4)
Appendix D: Leadership Interview Protocol 317(4)
Appendix E: Information Security Professional Interview Protocol 321(4)
Appendix F: Employee Interview Protocol 325(4)
Appendix G: Straightforward Acceptable Use Policy 329(4)
Appendix H: Straightforward Password Policy 333(4)
About the Authors 337(2)
Index 339

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program