Flylib.com
Electronic Monitoring in the Workplace: Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions
ISBN: 1591404568
EAN: 2147483647
Year: 2005
Pages: 161
BUY ON AMAZON
Table of Contents
BackCover
Electronic Monitoring in the Workplace--Controversies and Solutions
Preface
Overview of the Book
Chapter Summaries
References
Section I: Setting The Scene
Chapter I: Workplace Surveillance
Introduction
Factors Fueling the Growth of Employee Monitoring
Reasons for Monitoring Employees
Monitoring Technologies
Deployment of Monitoring Technologies
Effects of Monitoring on Employees
Guarding Against Employer Monitoring
Monitoring Beyond the Company Gates: Government Surveillance
Conclusion
References
Chapter II: Ethics of Workplace Surveillance Games
Background
Strategic Interaction
Surprising Strategies in the Panopticon
A General Surveillance Game
Ethics and a New Social Contract for Employee Surveillance
Trends: Ethical Hazards of Cheap New Technology
Acknowledgments
References
Chapter III: The Ethics of Hacking and Computer Abuse--Australian Case Studies
Introduction
Definition of Hacking
Australian Hackers
Computer Abuse Definition
Computer Abuse Case Studies
Conclusion
References
Section II: Employees Reactions
Chapter IV: Electronic Monitoring in the Workplace--If People Don t Care, Then What is the Relevance?
Introduction
Some Empirical Research on Surveillance
Research Limitations
Problem of Not Having a Problem
Arguments for Surveillance
The Concept of Privacy
Arguments Against Surveillance
Conclusion
References
Chapter V: Negotiating Workplace Surveillance
Introduction
Methods
Toward an Idiocultural Understanding of Surveillance
Ethical Considerations
Reflections on Past Surveillance
Negotiating the Margins
Conclusion
References
Chapter VI: Beyond Privacy and Fairness Concerns--Examining Psychological Boundary Violations as a Consequence of Electronic Performance Monitoring
Introduction
Overview of Electronic Performance Monitoring Research
Privacy and Fairness of EPM
Looking to the Future of Monitoring
Attitudes Toward Monitoring: Identifying the Latitude of Rejection Around Monitoring
Organizational Deviance and the Vicious Cycle of Monitoring
Fundamental Rights in Competition: Privacy vs. Fairness
Implications for the Practice of EPM in Organizations
The Road Ahead
References
Chapter VII: What Do Employees Think about Electronic Surveillance at Work?
Introduction
Electronic Surveillance in the Workplace: An Overview
Metaphoric and Theoretic Foundations
Results and Discussion
Conclusion
References
Section III: National And Cultural Perspectives
Chapter VIII: Establishing Boundaries--Employees, Employers and Workplace Monitoring
Introduction
Background
Issues, Controversies and Problems
Solutions and Recommendations
Future Trends
Conclusion
References
Chapter IX: Loaded Metaphors--Legal Explanations on Monitoring the Workplace in Spain
Introduction: E-Mail Monitoring Goes to the Spanish Courts
Background: Spanish Legislation Related to E-Mail Monitoring
Instruments vs. Letters: Analysis of Some Recent Spanish Sentences
Conclusion: Taylor and the Information Society
References
Chapter X: Electronic Monitoring in the American Academy
Introduction
Academic Freedom
Electronic Monitoring
Electronic Monitoring in the Academy
Conclusion: A Shared Civility
References
Chapter XI: Electronic Surveillance in the Workplace--A Buddhist Perspective
Introduction
Related Research
Importance of Development of Mental Quality
Conclusion
References
Section IV: Some Core Concepts
Chapter XII: Informed Consent and Electronic Monitoring in the Workplace
Electronic Monitoring and the Loss of Privacy
The Doctrine of Informed Consent
Informed Consent in the Workplace
Explicit Informed Consent
Implicit Informed Consent
Privacy in the Workplace
Appeal to the Value of Autonomy in the Workplace
Concluding Remarks
References
Chapter XIII: Personal Autonomy and Electronic Surveillance in the Workplace
Introduction
Moral Significance of Personal Autonomy
Electronic Surveillance and Covert Non-Constraining Control
Personal Autonomy in the Workplace
Summary
References
Chapter XIV: Guarding the Guards--The Right to Privacy, and Workplace Surveillance and Monitoring in Policing
Introduction
Moral Rights to Privacy and Confidentiality
Electronic Monitoring in the Workplace
Surveillance and Monitoring of Police Officers
References
Chapter XV: Universal Human Rights and Employee Privacy--Questioning Employer Monitoring of Computer Usage
Introduction
Legal Approach to Privacy on the Internet
What is Privacy?
International Bill of Rights
Justified Infringements of Rights: The Use of Harmful Methods
Right to Privacy and the Internet
Employer Monitoring and the Right to Privacy
Privacy and Internet Service Providers
Conclusion
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
Electronic Monitoring in the Workplace: Controversies and Solutions
ISBN: 1591404568
EAN: 2147483647
Year: 2005
Pages: 161
BUY ON AMAZON
MySQL Stored Procedure Programming
Creating and Using Cursors
Using Stored Procedures with Spring
Conclusion
Review of ADO.NET Basics
Using Stored Programs in ADO.NET
FileMaker Pro 8: The Missing Manual
Changing Multiple Records
What Makes a Layout
The Lowdown on Layouts
Going Beyond Basic Calculations
FileMaker Network Sharing
Java for RPG Programmers, 2nd Edition
Javas Language And Syntax
An Object Orientation
Database Access
More Java
Appendix A Using Java on the AS/400
Twisted Network Programming Essentials
Getting Started
Adding Twisted Utilities to Your Path
Calling SOAP Web Services
Downloading Messages from an IMAP Mailbox
Using Public Keys for Authentication
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
The Oracle Network Architecture
Oracle and PL/SQL
Triggers
Indirect Privilege Escalation
DNS & BIND Cookbook
Allowing Dynamic Updates
Introduction
Modifying Zone Data Without Restarting the Name Server
Introduction
Configuring the Order in Which a Resolver Uses DNS, /etc/hosts, and NIS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies