The visible employee :: using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust /
For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers-either through erro...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Medford, N.J. :
Information Today,
©2006.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers-either through error or by intent-is discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security soluti. |
Beschreibung: | 1 online resource (xvi, 353 pages) : illustrations |
Bibliographie: | Includes bibliographical references (pages 275-303) and index. |
ISBN: | 9781937290689 1937290689 9781937290696 1937290697 |
Internformat
MARC
LEADER | 00000cam a22000004a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm71848402 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 061005s2006 njua ob 001 0 eng d | ||
010 | |z 2006006265 | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCG |d OCLCQ |d YBM |d E7B |d OCLCQ |d TEFOD |d NLGGC |d TEFOD |d EBLCP |d DEBSZ |d CCO |d TEFOD |d OCLCQ |d AZK |d MOR |d ZCU |d MERUC |d OCLCQ |d OCLCF |d STF |d VNS |d WRM |d VTS |d COCUF |d AGLDB |d ICG |d VT2 |d OCLCQ |d AU@ |d WYU |d S9I |d REC |d DKC |d OCLCQ |d M8D |d INARC |d BOL |d OCLCO |d DST |d S2H |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 767502617 |a 785776250 |a 890466824 |a 923179603 |a 961684815 |a 962615737 |a 988474520 |a 1037767450 |a 1038624102 |a 1055397241 |a 1058974699 |a 1065988145 |a 1081212663 |a 1097123767 |a 1114352284 |a 1162445661 |a 1228616433 |a 1241866895 |a 1245890496 |a 1259120218 |a 1290031608 |a 1300455635 |a 1303388295 |a 1303523531 |a 1306583301 | ||
020 | |a 9781937290689 |q (electronic bk.) | ||
020 | |a 1937290689 |q (electronic bk.) | ||
020 | |a 9781937290696 |q (electronic bk.) | ||
020 | |a 1937290697 |q (electronic bk.) | ||
020 | |z 0910965749 | ||
020 | |z 9780910965743 | ||
035 | |a (OCoLC)71848402 |z (OCoLC)767502617 |z (OCoLC)785776250 |z (OCoLC)890466824 |z (OCoLC)923179603 |z (OCoLC)961684815 |z (OCoLC)962615737 |z (OCoLC)988474520 |z (OCoLC)1037767450 |z (OCoLC)1038624102 |z (OCoLC)1055397241 |z (OCoLC)1058974699 |z (OCoLC)1065988145 |z (OCoLC)1081212663 |z (OCoLC)1097123767 |z (OCoLC)1114352284 |z (OCoLC)1162445661 |z (OCoLC)1228616433 |z (OCoLC)1241866895 |z (OCoLC)1245890496 |z (OCoLC)1259120218 |z (OCoLC)1290031608 |z (OCoLC)1300455635 |z (OCoLC)1303388295 |z (OCoLC)1303523531 |z (OCoLC)1306583301 | ||
037 | |a 945064E8-0599-4E8D-AC3C-F50606313363 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a HF5549.5.E37 |b S73 2006eb | |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
072 | 7 | |a BUS |x 030000 |2 bisacsh | |
082 | 7 | |a 658.3/14 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Stanton, Jeffrey M., |d 1961- |1 https://id.oclc.org/worldcat/entity/E39PBJth7dhHfKt3fhmB7GQjG3 |0 http://id.loc.gov/authorities/names/n2006013082 | |
245 | 1 | 4 | |a The visible employee : |b using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / |c Jeffrey M. Stanton and Kathryn R. Stam. |
260 | |a Medford, N.J. : |b Information Today, |c ©2006. | ||
300 | |a 1 online resource (xvi, 353 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
340 | |g polychrome. |2 rdacc |0 http://rdaregistry.info/termList/RDAColourContent/1003 | ||
347 | |a data file |2 rda | ||
504 | |a Includes bibliographical references (pages 275-303) and index. | ||
505 | 0 | |a An introduction to information protection and employee behavior -- How employees affect information security -- Information security technologies and operations --Employee monitoring, surveillance, and privacy -- Managerial perspectives -- Information technology professionals' perspectives -- Employee perspectives on information security and privacy -- Overall analysis and interpretation -- Recommendations for managers, employees, and information security professionals. | |
588 | 0 | |a Print version record. | |
520 | |a For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers-either through error or by intent-is discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security soluti. | ||
650 | 0 | |a Electronic monitoring in the workplace. |0 http://id.loc.gov/authorities/subjects/sh00009296 | |
650 | 0 | |a Data protection |x Management. | |
650 | 0 | |a Information resources management. |0 http://id.loc.gov/authorities/subjects/sh85066147 | |
650 | 0 | |a Supervision of employees. |0 http://id.loc.gov/authorities/subjects/sh85130668 | |
650 | 0 | |a Privacy, Right of. |0 http://id.loc.gov/authorities/subjects/sh85107029 | |
650 | 2 | |a Information Management |0 https://id.nlm.nih.gov/mesh/D019451 | |
650 | 6 | |a Surveillance électronique en milieu de travail. | |
650 | 6 | |a Protection de l'information (Informatique) |x Gestion. | |
650 | 6 | |a Gestion de l'information. | |
650 | 6 | |a Personnel |x Supervision. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Human Resources & Personnel Management. |2 bisacsh | |
650 | 7 | |a Electronic monitoring in the workplace |2 fast | |
650 | 7 | |a Information resources management |2 fast | |
650 | 7 | |a Privacy, Right of |2 fast | |
650 | 7 | |a Supervision of employees |2 fast | |
700 | 1 | |a Stam, Kathryn R., |d 1966- |1 https://id.oclc.org/worldcat/entity/E39PBJm4M4pGtCHKv83btMGrbd |0 http://id.loc.gov/authorities/names/n2006013089 | |
758 | |i has work: |a The visible employee (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGGjyjyc9CCwjkVWX3xmtX |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Stanton, Jeffrey M., 1961- |t Visible employee. |d Medford, N.J. : Information Today, ©2006 |z 0910965749 |w (DLC) 2006006265 |w (OCoLC)64390502 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=167123 |3 Volltext |
938 | |a Internet Archive |b INAR |n visibleemployeeu0000stan | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL809598 | ||
938 | |a ebrary |b EBRY |n ebr10524187 | ||
938 | |a EBSCOhost |b EBSC |n 167123 | ||
938 | |a YBP Library Services |b YANK |n 7269387 | ||
938 | |a YBP Library Services |b YANK |n 2484628 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm71848402 |
---|---|
_version_ | 1816881641882124288 |
adam_text | |
any_adam_object | |
author | Stanton, Jeffrey M., 1961- |
author2 | Stam, Kathryn R., 1966- |
author2_role | |
author2_variant | k r s kr krs |
author_GND | http://id.loc.gov/authorities/names/n2006013082 http://id.loc.gov/authorities/names/n2006013089 |
author_facet | Stanton, Jeffrey M., 1961- Stam, Kathryn R., 1966- |
author_role | |
author_sort | Stanton, Jeffrey M., 1961- |
author_variant | j m s jm jms |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HF5549 |
callnumber-raw | HF5549.5.E37 S73 2006eb |
callnumber-search | HF5549.5.E37 S73 2006eb |
callnumber-sort | HF 45549.5 E37 S73 42006EB |
callnumber-subject | HF - Commerce |
collection | ZDB-4-EBA |
contents | An introduction to information protection and employee behavior -- How employees affect information security -- Information security technologies and operations --Employee monitoring, surveillance, and privacy -- Managerial perspectives -- Information technology professionals' perspectives -- Employee perspectives on information security and privacy -- Overall analysis and interpretation -- Recommendations for managers, employees, and information security professionals. |
ctrlnum | (OCoLC)71848402 |
dewey-full | 658.3/14 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.3/14 |
dewey-search | 658.3/14 |
dewey-sort | 3658.3 214 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05811cam a22007694a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm71848402 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">061005s2006 njua ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2006006265</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YBM</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TEFOD</subfield><subfield code="d">NLGGC</subfield><subfield code="d">TEFOD</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">CCO</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">MOR</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">STF</subfield><subfield code="d">VNS</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ICG</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">WYU</subfield><subfield code="d">S9I</subfield><subfield code="d">REC</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">INARC</subfield><subfield code="d">BOL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DST</subfield><subfield code="d">S2H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">767502617</subfield><subfield code="a">785776250</subfield><subfield code="a">890466824</subfield><subfield code="a">923179603</subfield><subfield code="a">961684815</subfield><subfield code="a">962615737</subfield><subfield code="a">988474520</subfield><subfield code="a">1037767450</subfield><subfield code="a">1038624102</subfield><subfield code="a">1055397241</subfield><subfield code="a">1058974699</subfield><subfield code="a">1065988145</subfield><subfield code="a">1081212663</subfield><subfield code="a">1097123767</subfield><subfield code="a">1114352284</subfield><subfield code="a">1162445661</subfield><subfield code="a">1228616433</subfield><subfield code="a">1241866895</subfield><subfield code="a">1245890496</subfield><subfield code="a">1259120218</subfield><subfield code="a">1290031608</subfield><subfield code="a">1300455635</subfield><subfield code="a">1303388295</subfield><subfield code="a">1303523531</subfield><subfield code="a">1306583301</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781937290689</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1937290689</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781937290696</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1937290697</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0910965749</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780910965743</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)71848402</subfield><subfield code="z">(OCoLC)767502617</subfield><subfield code="z">(OCoLC)785776250</subfield><subfield code="z">(OCoLC)890466824</subfield><subfield code="z">(OCoLC)923179603</subfield><subfield code="z">(OCoLC)961684815</subfield><subfield code="z">(OCoLC)962615737</subfield><subfield code="z">(OCoLC)988474520</subfield><subfield code="z">(OCoLC)1037767450</subfield><subfield code="z">(OCoLC)1038624102</subfield><subfield code="z">(OCoLC)1055397241</subfield><subfield code="z">(OCoLC)1058974699</subfield><subfield code="z">(OCoLC)1065988145</subfield><subfield code="z">(OCoLC)1081212663</subfield><subfield code="z">(OCoLC)1097123767</subfield><subfield code="z">(OCoLC)1114352284</subfield><subfield code="z">(OCoLC)1162445661</subfield><subfield code="z">(OCoLC)1228616433</subfield><subfield code="z">(OCoLC)1241866895</subfield><subfield code="z">(OCoLC)1245890496</subfield><subfield code="z">(OCoLC)1259120218</subfield><subfield code="z">(OCoLC)1290031608</subfield><subfield code="z">(OCoLC)1300455635</subfield><subfield code="z">(OCoLC)1303388295</subfield><subfield code="z">(OCoLC)1303523531</subfield><subfield code="z">(OCoLC)1306583301</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">945064E8-0599-4E8D-AC3C-F50606313363</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5549.5.E37</subfield><subfield code="b">S73 2006eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">097000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">030000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.3/14</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stanton, Jeffrey M.,</subfield><subfield code="d">1961-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJth7dhHfKt3fhmB7GQjG3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2006013082</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The visible employee :</subfield><subfield code="b">using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust /</subfield><subfield code="c">Jeffrey M. Stanton and Kathryn R. Stam.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Medford, N.J. :</subfield><subfield code="b">Information Today,</subfield><subfield code="c">©2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 353 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="340" ind1=" " ind2=" "><subfield code="g">polychrome.</subfield><subfield code="2">rdacc</subfield><subfield code="0">http://rdaregistry.info/termList/RDAColourContent/1003</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 275-303) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">An introduction to information protection and employee behavior -- How employees affect information security -- Information security technologies and operations --Employee monitoring, surveillance, and privacy -- Managerial perspectives -- Information technology professionals' perspectives -- Employee perspectives on information security and privacy -- Overall analysis and interpretation -- Recommendations for managers, employees, and information security professionals.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers-either through error or by intent-is discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security soluti.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic monitoring in the workplace.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00009296</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information resources management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85066147</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Supervision of employees.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85130668</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85107029</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Information Management</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D019451</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Surveillance électronique en milieu de travail.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Gestion de l'information.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Personnel</subfield><subfield code="x">Supervision.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Workplace Culture.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Human Resources & Personnel Management.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic monitoring in the workplace</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information resources management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Privacy, Right of</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Supervision of employees</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stam, Kathryn R.,</subfield><subfield code="d">1966-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJm4M4pGtCHKv83btMGrbd</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2006013089</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The visible employee (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGGjyjyc9CCwjkVWX3xmtX</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Stanton, Jeffrey M., 1961-</subfield><subfield code="t">Visible employee.</subfield><subfield code="d">Medford, N.J. : Information Today, ©2006</subfield><subfield code="z">0910965749</subfield><subfield code="w">(DLC) 2006006265</subfield><subfield code="w">(OCoLC)64390502</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=167123</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">visibleemployeeu0000stan</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL809598</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10524187</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">167123</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7269387</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2484628</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm71848402 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:57Z |
institution | BVB |
isbn | 9781937290689 1937290689 9781937290696 1937290697 |
language | English |
oclc_num | 71848402 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvi, 353 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Information Today, |
record_format | marc |
spelling | Stanton, Jeffrey M., 1961- https://id.oclc.org/worldcat/entity/E39PBJth7dhHfKt3fhmB7GQjG3 http://id.loc.gov/authorities/names/n2006013082 The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / Jeffrey M. Stanton and Kathryn R. Stam. Medford, N.J. : Information Today, ©2006. 1 online resource (xvi, 353 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier polychrome. rdacc http://rdaregistry.info/termList/RDAColourContent/1003 data file rda Includes bibliographical references (pages 275-303) and index. An introduction to information protection and employee behavior -- How employees affect information security -- Information security technologies and operations --Employee monitoring, surveillance, and privacy -- Managerial perspectives -- Information technology professionals' perspectives -- Employee perspectives on information security and privacy -- Overall analysis and interpretation -- Recommendations for managers, employees, and information security professionals. Print version record. For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers-either through error or by intent-is discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security soluti. Electronic monitoring in the workplace. http://id.loc.gov/authorities/subjects/sh00009296 Data protection Management. Information resources management. http://id.loc.gov/authorities/subjects/sh85066147 Supervision of employees. http://id.loc.gov/authorities/subjects/sh85130668 Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Information Management https://id.nlm.nih.gov/mesh/D019451 Surveillance électronique en milieu de travail. Protection de l'information (Informatique) Gestion. Gestion de l'information. Personnel Supervision. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Human Resources & Personnel Management. bisacsh Electronic monitoring in the workplace fast Information resources management fast Privacy, Right of fast Supervision of employees fast Stam, Kathryn R., 1966- https://id.oclc.org/worldcat/entity/E39PBJm4M4pGtCHKv83btMGrbd http://id.loc.gov/authorities/names/n2006013089 has work: The visible employee (Text) https://id.oclc.org/worldcat/entity/E39PCGGjyjyc9CCwjkVWX3xmtX https://id.oclc.org/worldcat/ontology/hasWork Print version: Stanton, Jeffrey M., 1961- Visible employee. Medford, N.J. : Information Today, ©2006 0910965749 (DLC) 2006006265 (OCoLC)64390502 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=167123 Volltext |
spellingShingle | Stanton, Jeffrey M., 1961- The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / An introduction to information protection and employee behavior -- How employees affect information security -- Information security technologies and operations --Employee monitoring, surveillance, and privacy -- Managerial perspectives -- Information technology professionals' perspectives -- Employee perspectives on information security and privacy -- Overall analysis and interpretation -- Recommendations for managers, employees, and information security professionals. Electronic monitoring in the workplace. http://id.loc.gov/authorities/subjects/sh00009296 Data protection Management. Information resources management. http://id.loc.gov/authorities/subjects/sh85066147 Supervision of employees. http://id.loc.gov/authorities/subjects/sh85130668 Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Information Management https://id.nlm.nih.gov/mesh/D019451 Surveillance électronique en milieu de travail. Protection de l'information (Informatique) Gestion. Gestion de l'information. Personnel Supervision. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Human Resources & Personnel Management. bisacsh Electronic monitoring in the workplace fast Information resources management fast Privacy, Right of fast Supervision of employees fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh00009296 http://id.loc.gov/authorities/subjects/sh85066147 http://id.loc.gov/authorities/subjects/sh85130668 http://id.loc.gov/authorities/subjects/sh85107029 https://id.nlm.nih.gov/mesh/D019451 |
title | The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / |
title_auth | The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / |
title_exact_search | The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / |
title_full | The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / Jeffrey M. Stanton and Kathryn R. Stam. |
title_fullStr | The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / Jeffrey M. Stanton and Kathryn R. Stam. |
title_full_unstemmed | The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / Jeffrey M. Stanton and Kathryn R. Stam. |
title_short | The visible employee : |
title_sort | visible employee using workplace monitoring and surveillance to protect information assets without compromising employee privacy or trust |
title_sub | using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / |
topic | Electronic monitoring in the workplace. http://id.loc.gov/authorities/subjects/sh00009296 Data protection Management. Information resources management. http://id.loc.gov/authorities/subjects/sh85066147 Supervision of employees. http://id.loc.gov/authorities/subjects/sh85130668 Privacy, Right of. http://id.loc.gov/authorities/subjects/sh85107029 Information Management https://id.nlm.nih.gov/mesh/D019451 Surveillance électronique en milieu de travail. Protection de l'information (Informatique) Gestion. Gestion de l'information. Personnel Supervision. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Human Resources & Personnel Management. bisacsh Electronic monitoring in the workplace fast Information resources management fast Privacy, Right of fast Supervision of employees fast |
topic_facet | Electronic monitoring in the workplace. Data protection Management. Information resources management. Supervision of employees. Privacy, Right of. Information Management Surveillance électronique en milieu de travail. Protection de l'information (Informatique) Gestion. Gestion de l'information. Personnel Supervision. BUSINESS & ECONOMICS Workplace Culture. BUSINESS & ECONOMICS Human Resources & Personnel Management. Electronic monitoring in the workplace Information resources management Privacy, Right of Supervision of employees |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=167123 |
work_keys_str_mv | AT stantonjeffreym thevisibleemployeeusingworkplacemonitoringandsurveillancetoprotectinformationassetswithoutcompromisingemployeeprivacyortrust AT stamkathrynr thevisibleemployeeusingworkplacemonitoringandsurveillancetoprotectinformationassetswithoutcompromisingemployeeprivacyortrust AT stantonjeffreym visibleemployeeusingworkplacemonitoringandsurveillancetoprotectinformationassetswithoutcompromisingemployeeprivacyortrust AT stamkathrynr visibleemployeeusingworkplacemonitoringandsurveillancetoprotectinformationassetswithoutcompromisingemployeeprivacyortrust |