Atnaujinkite slapukų nuostatas

Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets [Minkštas viršelis]

  • Formatas: Paperback / softback, 353 pages, aukštis x plotis: 230x185 mm
  • Išleidimo metai: 01-Jun-2006
  • Leidėjas: CyberAge Books
  • ISBN-10: 0910965749
  • ISBN-13: 9780910965743
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 353 pages, aukštis x plotis: 230x185 mm
  • Išleidimo metai: 01-Jun-2006
  • Leidėjas: CyberAge Books
  • ISBN-10: 0910965749
  • ISBN-13: 9780910965743
Kitos knygos pagal šią temą:
For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers—either through error or by intent—is discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security solutions for at-risk organizations but also the perceptions and attitudes of employees toward workplace surveillance.
Foreword, by Gurpreet Dhillon xi
Acknowledgments xiii
Preface xv
CHAPTER 1 An Introduction to Information Protection and Employee Behavior 1(10)
A Note About Terminology
9(2)
CHAPTER 2 How Employees Affect Information Security 11(28)
An Information Security Overview
12(10)
Security Implications of Employee
Information Technology Usage
22(15)
Summary: Employees—Both a Vulnerability and a Resource
37(2)
CHAPTER 3 Information Security Technologies and Operations 39(24)
Security Technology Overview
39(7)
Protection Technologies for Use on the Inside
46(15)
Summary: Two Pitfalls of Employee Monitoring
61(2)
CHAPTER 4 Employee Monitoring, Surveillance, and Privacy 63(20)
Laws Affecting Security and Privacy
64(4)
Analyzing Privacy at Work
68(3)
Privacy as Control over Personal Information
71(3)
Privacy and Trust
74(2)
Privacy and Fairness
76(3)
The Zone of Acceptance
79(1)
Information Privacy in the Workplace: Three Factors and the Zone
80(3)
CHAPTER 5 Managerial Perspectives 83(42)
Managers' Attitudes Toward Information Technology
85(10)
Managers' Beliefs About Information Security
95(16)
Managerial Perspectives on Employee Monitoring
111(6)
Statistical Studies of Managers and Security
117(8)
CHAPTER 6 Information Technology Professionals' Perspectives 125(38)
Influencing User Behavior
134(3)
Security Policies
137(3)
Communication
140(5)
Training
145(3)
Monitoring
148(5)
Leader Priorities
153(4)
Survey of Information Technology Professionals
157(3)
Information Technology Professionals' Perspectives on Security and Privacy
160(3)
CHAPTER 7 Employee Perspectives on Information Security and Privacy 163(64)
Background: Employee Beliefs About Information Technology and Security
167(23)
Vulnerabilities: Users' Perceptions of Barriers to Positive Security Practices
190(9)
User Perspectives on Training, Policy, and Monitoring
199(8)
Employee Perspectives on Workplace Monitoring
207(9)
Overall Recap of Interview Data
216(1)
A Survey of Employee Beliefs and Information Security
217(10)
CHAPTER 8 Overall Analysis and Interpretation 227(26)
Priorities for Information Security
228(3)
Computer-Related Behavior of Employees/Users
231(2)
Communication Among Different Groups in the Organization
233(2)
Policies, Training, and Behavioral Influences
235(5)
Electronic Monitoring and Surveillance Rights
240(2)
Organizational Cycles of Monitoring and Security
242(8)
Complex Security Risks in Organizations
250(3)
CHAPTER 9 Recommendations for Managers, Employees, and Information Security Professionals 253(22)
The Main Message: Transparent Security Governance
254(11)
Resistance to Organizational Change
265(7)
Promoting Insider Integrity
272(3)
References 275(22)
Appendix A: Recommended Reading 297(8)
Appendix B: Discussion Questions 305(8)
Appendix C: Employee Security-Related Behavior List 313(4)
Appendix D: Leadership Interview Protocol 317(4)
Appendix E: Information Security Professional Interview Protocol 321(4)
Appendix F: Employee Interview Protocol 325(4)
Appendix G: Straightforward Acceptable Use Policy 329(4)
Appendix H: Straightforward Password Policy 333(4)
About the Authors 337(2)
Index 339