Flylib.com
Electronic Monitoring in the Workplace: Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions
ISBN: 1591404568
EAN: 2147483647
Year: 2005
Pages: 161
BUY ON AMAZON
Table of Contents
BackCover
Electronic Monitoring in the Workplace--Controversies and Solutions
Preface
Overview of the Book
Chapter Summaries
References
Section I: Setting The Scene
Chapter I: Workplace Surveillance
Introduction
Factors Fueling the Growth of Employee Monitoring
Reasons for Monitoring Employees
Monitoring Technologies
Deployment of Monitoring Technologies
Effects of Monitoring on Employees
Guarding Against Employer Monitoring
Monitoring Beyond the Company Gates: Government Surveillance
Conclusion
References
Chapter II: Ethics of Workplace Surveillance Games
Background
Strategic Interaction
Surprising Strategies in the Panopticon
A General Surveillance Game
Ethics and a New Social Contract for Employee Surveillance
Trends: Ethical Hazards of Cheap New Technology
Acknowledgments
References
Chapter III: The Ethics of Hacking and Computer Abuse--Australian Case Studies
Introduction
Definition of Hacking
Australian Hackers
Computer Abuse Definition
Computer Abuse Case Studies
Conclusion
References
Section II: Employees Reactions
Chapter IV: Electronic Monitoring in the Workplace--If People Don t Care, Then What is the Relevance?
Introduction
Some Empirical Research on Surveillance
Research Limitations
Problem of Not Having a Problem
Arguments for Surveillance
The Concept of Privacy
Arguments Against Surveillance
Conclusion
References
Chapter V: Negotiating Workplace Surveillance
Introduction
Methods
Toward an Idiocultural Understanding of Surveillance
Ethical Considerations
Reflections on Past Surveillance
Negotiating the Margins
Conclusion
References
Chapter VI: Beyond Privacy and Fairness Concerns--Examining Psychological Boundary Violations as a Consequence of Electronic Performance Monitoring
Introduction
Overview of Electronic Performance Monitoring Research
Privacy and Fairness of EPM
Looking to the Future of Monitoring
Attitudes Toward Monitoring: Identifying the Latitude of Rejection Around Monitoring
Organizational Deviance and the Vicious Cycle of Monitoring
Fundamental Rights in Competition: Privacy vs. Fairness
Implications for the Practice of EPM in Organizations
The Road Ahead
References
Chapter VII: What Do Employees Think about Electronic Surveillance at Work?
Introduction
Electronic Surveillance in the Workplace: An Overview
Metaphoric and Theoretic Foundations
Results and Discussion
Conclusion
References
Section III: National And Cultural Perspectives
Chapter VIII: Establishing Boundaries--Employees, Employers and Workplace Monitoring
Introduction
Background
Issues, Controversies and Problems
Solutions and Recommendations
Future Trends
Conclusion
References
Chapter IX: Loaded Metaphors--Legal Explanations on Monitoring the Workplace in Spain
Introduction: E-Mail Monitoring Goes to the Spanish Courts
Background: Spanish Legislation Related to E-Mail Monitoring
Instruments vs. Letters: Analysis of Some Recent Spanish Sentences
Conclusion: Taylor and the Information Society
References
Chapter X: Electronic Monitoring in the American Academy
Introduction
Academic Freedom
Electronic Monitoring
Electronic Monitoring in the Academy
Conclusion: A Shared Civility
References
Chapter XI: Electronic Surveillance in the Workplace--A Buddhist Perspective
Introduction
Related Research
Importance of Development of Mental Quality
Conclusion
References
Section IV: Some Core Concepts
Chapter XII: Informed Consent and Electronic Monitoring in the Workplace
Electronic Monitoring and the Loss of Privacy
The Doctrine of Informed Consent
Informed Consent in the Workplace
Explicit Informed Consent
Implicit Informed Consent
Privacy in the Workplace
Appeal to the Value of Autonomy in the Workplace
Concluding Remarks
References
Chapter XIII: Personal Autonomy and Electronic Surveillance in the Workplace
Introduction
Moral Significance of Personal Autonomy
Electronic Surveillance and Covert Non-Constraining Control
Personal Autonomy in the Workplace
Summary
References
Chapter XIV: Guarding the Guards--The Right to Privacy, and Workplace Surveillance and Monitoring in Policing
Introduction
Moral Rights to Privacy and Confidentiality
Electronic Monitoring in the Workplace
Surveillance and Monitoring of Police Officers
References
Chapter XV: Universal Human Rights and Employee Privacy--Questioning Employer Monitoring of Computer Usage
Introduction
Legal Approach to Privacy on the Internet
What is Privacy?
International Bill of Rights
Justified Infringements of Rights: The Use of Harmful Methods
Right to Privacy and the Internet
Employer Monitoring and the Right to Privacy
Privacy and Internet Service Providers
Conclusion
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
Electronic Monitoring in the Workplace: Controversies and Solutions
ISBN: 1591404568
EAN: 2147483647
Year: 2005
Pages: 161
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to Exchange or Outlook
Searching and Analyzing Data
Updating Data Asynchronously Using Message Queuing
Binding a Group of Radio Buttons in a Windows Form
Listing Installed OLE DB Providers
Project Management JumpStart
Defining the Project Goals
Breaking Down the Project Activities
Planning and Acquiring Resources
Assessing Risk
Appendix C Sample Project Management Checklists
Absolute Beginner[ap]s Guide to Project Management
Essential Elements for any Successful Project
Building a Project Plan
Typical Problems
Proven Techniques for Leading Cross-Cultural Projects
Ten Proven Principles of Vendor Management
Snort Cookbook
Uninstalling Snort from Windows
Running Snort as a Linux Daemon
Reloading Snort Settings
Logging to Multiple Locations
Securing ACID
Building Web Applications with UML (2nd Edition)
HTML
Activities
Software Development for Web Applications
Web Application Presentation Tier: Architectural Patterns
Requirements
Twisted Network Programming Essentials
Using the Twisted Documentation
Building Simple Clients and Servers
Responding to HTTP Requests
Installing SOAP Libraries
Downloading Mail from a POP3 Server
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies