American Civil Liberties Union. (2001). European Parliament launches official inquiry in US; Concerned with implications of top secret ECHELON surveillance system. Retrieved September 28, 2003: http://www.aclu.org/privacy/privacy.cmf
Botan, C., & McCreadie, M. (1993). Communication, information, and surveillance: Separation and control in organizations. In B. Ruben & J. Schement (Eds.), Information and behavior (Vol. IV, pp. 18, 20). New Brunswick, NJ: Transaction.
Kirch, J.F. (2000). Fingering fraud. TrueActive News . Retrieved September 26, 2003: http://www.trueactive.com/news.fraud.asp
Kizza, J.M. (2002). Ethical and social issues in the information age (second edition, pp. 158-194). Springer.
Nickson, S. (2002). The legal guide to employee monitoring. SurfControl. Retrieved September 27, 2003: http://www.SurfControl.com
Nussbaum, K. (1991). Computer monitoring: A threat to the right to privacy. In R. Dejoie, G. Fowler & D. Paradice (Eds.), Ethical issues in information systems . Boston, MA: Boyd and Fraser.
Panko, R. (2004). Corporate computer and network security . Upper Saddle River, NJ: Prentice Hall.
Privacy Committee of the New South Wales. (1995). Invisible eyes: Report on video surveillance in the workplace. Report #67, September.
Privacy Rights Clearinghouse. (1997). Workplace privacy. Retrieved September 25, 2003: http://www.privacyrights.org/fs/fs7-work.htm
Schulman, A. (2001a). The extent of systematic monitoring of employee e-mail and Internet use. Privacy Foundation . Retrieved September 25, 2003: http://www. sonic .net/~undoc/extenpf.htm
Schulman, A. (2001b). Computer and Internet surveillance in the workplace: Rough notes. Retrieved September 27, 2003: http://www.sonic.net/~undoc/survetech.htm
Schulman, A. (2001c). The boss button updated: Web anonymizers vs. employee monitoring. Retrieved September 27, 2003: http://www.privacyfoundation.org/workplace/technology/tech_show.Asp
Schulman, A. (2001d). Client or server: A primer on employee monitoring technology. Retrieved September 27, 2003: http://www.privacyfoundation.org/workplace/print.asp
Shepard, J. (1971). Automation and alienation . Cambridge, MA: MIT Press. TrueActive. (2000). Monitoring the enterprise. Retrieved September 26, 2003: http://www.trueactive.com/news.fraud.asp
TrueActive. (2001). FBI uses TrueActive investigator in Russian Invita hacker case. Retrieved September 26, 2003: http://www.trueactive.com/news/fbi/index.htm
Wallace, B., & Fenton, J. (2001). Is your PC watching you? PCWorld.com . Retrieved September 27, 2003: http://www.pcworld.comresource/printible/article/0,aid,32863,00.asp
WorkerWatch. (2000). Statistics. Retrieved September 27, 2003: http://www.workerwatch.org/statistics.htm