The visible employee: Electronic monitoring and information security

Jeffrey M. Stanton, Kathryn R. Stam

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Every organization creates and processes information in some form. Unfortunately, security threats affecting the organization's information have grown over recent years. Although good technology is critical to information security, user behavior also affects security. Monitoring, surveillance, filtering, logging, and tracking are all words that have been used to describe the processes that organizations use to help understand if, when, and how workers are doing their jobs and handling the organization's data carefully. In this paper, we have distilled key elements of our forthcoming book on this topic. Because of space limitations only 16 interviews are excerpted from the large body of source material we collected. After presenting a summary of these data, we conclude with a preview of recommended processes for supporting information protection that may benefit organizations.

Original languageEnglish (US)
Title of host publicationAssociation for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006
Pages3364-3370
Number of pages7
StatePublished - Dec 1 2006
Event12th Americas Conference on Information Systems, AMCIS 2006 - Acapulco, Mexico
Duration: Aug 4 2006Aug 6 2006

Publication series

NameAssociation for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006
Volume6

Other

Other12th Americas Conference on Information Systems, AMCIS 2006
CountryMexico
CityAcapulco
Period8/4/068/6/06

Keywords

  • Electronic monitoring
  • Information security
  • Organizational behavior

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications
  • Library and Information Sciences
  • Information Systems

Fingerprint Dive into the research topics of 'The visible employee: Electronic monitoring and information security'. Together they form a unique fingerprint.

  • Cite this

    Stanton, J. M., & Stam, K. R. (2006). The visible employee: Electronic monitoring and information security. In Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006 (pp. 3364-3370). (Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006; Vol. 6).