Every organization creates and processes information in some form. Unfortunately, security threats affecting the organization's information have grown over recent years. Although good technology is critical to information security, user behavior also affects security. Monitoring, surveillance, filtering, logging, and tracking are all words that have been used to describe the processes that organizations use to help understand if, when, and how workers are doing their jobs and handling the organization's data carefully. In this paper, we have distilled key elements of our forthcoming book on this topic. Because of space limitations only 16 interviews are excerpted from the large body of source material we collected. After presenting a summary of these data, we conclude with a preview of recommended processes for supporting information protection that may benefit organizations.
|Original language||English (US)|
|Title of host publication||Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006|
|State||Published - Dec 1 2006|