The visible employee: Electronic monitoring and information security

Jeffrey Stanton, Kathryn R. Stam

Research output: Chapter in Book/Entry/PoemConference contribution

Abstract

Every organization creates and processes information in some form. Unfortunately, security threats affecting the organization's information have grown over recent years. Although good technology is critical to information security, user behavior also affects security. Monitoring, surveillance, filtering, logging, and tracking are all words that have been used to describe the processes that organizations use to help understand if, when, and how workers are doing their jobs and handling the organization's data carefully. In this paper, we have distilled key elements of our forthcoming book on this topic. Because of space limitations only 16 interviews are excerpted from the large body of source material we collected. After presenting a summary of these data, we conclude with a preview of recommended processes for supporting information protection that may benefit organizations.

Original languageEnglish (US)
Title of host publicationAssociation for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006
StatePublished - Dec 1 2006

Fingerprint

Dive into the research topics of 'The visible employee: Electronic monitoring and information security'. Together they form a unique fingerprint.

Cite this