SlideShare a Scribd company logo
1 of 10
Download to read offline
ZENITH 
International Journal of Multidisciplinary Research 
Vol.2 Issue 2, February 2012, ISSN 2231 5780 
www.zenithresearch.org.in 281 
THE TECHNIQUES AND RATIONALE OF E- SURVEILLANCE PRACTICES IN ORGANIZATIONS DR.AISHA M.SHERIFF*; MRS. GEETHA RAVISHANKAR** *Professor, Department of Studies in Business Administration, University Mysore. **Faculty, MBA Department, RJS Institute of Management Studies, Koramangala, Bangalore. ABSTRACT The conceptual paper entitled –“The Techniques and Rationale of e-Surveillance Practices in Organizations” elucidates some of the key ethical issues arising out of the use of surveillance technology in the workplace. Information age is steering the organizations towards increased use of online workforce. This has led to the extensive dependence on internet in the organizations. The advent of Web 2.0 applications have acted as facilitating factors for cyber loafing of online workforce. Since Web 2.0 applications induce interactive information sharing, interoperability and collaboration on the World Wide Web, employees are provoked to indulge in mailing, chatting, entering virtual world, social networking blogging, podcasting, Net-surfing, online trading and the like. This leads to loss of productivity and loss of work-time in organizations. To regulate such unethical practices of using organizational technology for employees‟ personal indulgences, most of the organizations across the globe have adopted work place surveillance systems to monitor erring employees with the help of surveillance devices and gadgets. Employees consider surveillance or monitoring system as intrusion into their privacy and unethical. They also claim that it is an indication of lack of trust in them. This paper discusses about some of the e-techniques used for employee surveillance in organizations and the rationale behind e-monitoring it. 
KERWORDS: Cyber bludging, Cyber loafing, Cyber slacking, e-Surveillance, Rich Internet Applications (RIA)., Web 2.0 applications ,Workplace Surveillance techniques. ______________________________________________________________________________ INTRODUCTION 
The recent strides in information technology has enabled use of several web 2.0 applications which are luring ,employees to indulge in Cyber slacking activities like sending personal emails, podcasting, blogging, chatting on Social Networking Sites(SNS) like face book, LinkedIn ,twitter orkut and others. Besides these, they also involve in unofficial browsing, online trading, shopping, gamming, checking stock prices, gambling, moonlighting and a host of other e-loafing activities. As a consequence, organizations are facing a slump in the productivity of their workforce. In order to enhance productivity and to discourage cyber loafing, most of the business organizations have instituted systematic and continuous scrutinizing in the workplace through electronic surveillance system.
ZENITH 
International Journal of Multidisciplinary Research 
Vol.2 Issue 2, February 2012, ISSN 2231 5780 
www.zenithresearch.org.in 282 
OPERATIONAL DEFINITIONS 1.’CYBER SLACKING,’ „CYBER LOAFING,’ AND ‘CYBER BLUDGING’ are terms used to describe the activities involved in wasting time on the internet while people are supposedly at work. Cyber slacking is recreational web surfing on the job or using the internet at work for one's own purposes. This often leads to productivity loss, bandwidth degradation and exhaustive use of organizational resources. It may also result in legal liability to the employers and might expose to viruses spyware and malware .Posting defamatory content in chat rooms and news groups and sending emails under employer‟s domain can lead to legal liability to the employer. 2. WORKPLACE SURVEILLANCE is a means by which organizations monitor the activities of the employees with the help of Information technology (IT) enabled tools and devices. When IT applications are used in workplace monitoring it is known as e-surveillance. (Refer figure-2 for e-surveillance techniques). 3. E-Surveillance Techniques E-surveillance techniques refer to all those IT enabled surveillance techniques used in business establishments‟, shopping malls and Government organizations for the purpose of facilitating effective monitoring and surveillance. These techniques are mostly used- to avoid misuse of enterprise resources, to secure organizations against legal liability, to enhance productivity and to avoid loss of work time due to e-loafing practices. 
Checking stock 
Prices 
Cyber slacking activities 
In workplace 
Uploading and downloading content 
Unofficial Browsing 
Online 
Trading/Shopping 
Gamming and 
Gambling 
Sending personal mails 
Social Networking 
Blogging &Podcasting 
FIGURE-1: CYBER SLACKING ACTIVITIES OF EMPLOYEES IN WORKPLACE
ZENITH 
International Journal of Multidisciplinary Research 
Vol.2 Issue 2, February 2012, ISSN 2231 5780 
www.zenithresearch.org.in 283 
The surveillance tools are generally called as web sleuths, spy agents, shadows or silent watchers. Some of the e-surveillance techniques used in organizations to monitor employees include – 
 Packet Sniffers, a diagnostic software programme that is used to scrutinize all the information that passes through the network to which it is connected. Packet sniffers can be setup with or without filters. They can monitor online activities like the sites visited, mails sent and received internet telephony and audio, video or textual downloads. They help in determining the work time lost due to cyber slacking. 
 Desktop Monitoring Devices are installed on the computer at the assembly level. They can intercept the signals and can replicate what the user is seeing or typing on the employer‟s desktop. Desktop monitoring software can be physically installed by someone or can be remotely installed by sending Trojan horse through email attachment. Hackers also use desktop monitors to record keystrokes and to steal personal data. 
 Log Files System Administrator will help to track and determine the websites visited by the employees‟ .It also detects emails sent and received and files downloaded. The log files can be retrieved even after deleting them. They can be found in operating systems, emails, web browsers and applications as back ups. 
 Closed Circuit Cameras are used in the workplace to monitor employees‟ activities. They are mainly used for security, training and monitoring purposes. More than 78% of US companies use CCTVs to monitor their workers. CCTVs will combat personal uses of office technology and devices. It saves time and money and enhances productivity of the organization. 
 Telephone tapping or Recording is done for quality assessment and for enhancing the telephonic skills of the employees. Telephone tapping helps the companies to prevent personal use of telephones. 
 Email filters Email filters are used as monitoring tools to filter and process both incoming and outgoing mails of employees in the workplace 
 Packet Sniffers 
 Desktop monitors 
 Log Files System Administrator 
 CCTVs 
 Telephone tapping or monitoring 
 E-mail filters 
 Surf Controllers 
 Activity Monitors 
FIGURE-2: E-SURVEILLANCE TECHNIQUES
ZENITH 
International Journal of Multidisciplinary Research 
Vol.2 Issue 2, February 2012, ISSN 2231 5780 
www.zenithresearch.org.in 284 
 Surf controllers will monitor, inspect and control billions of Web sites visited by employees‟ everyday in the workplace. It will also inspect their emails and other Internet- based communications periodically and provides web security against malware, spyware and viruses. 
 Activity Monitors are powerful employee monitoring tools that consist of server and client parts. Server can be installed on any computers in the entire Local Area Network (LAN) and the activities of employees on such computers can be spied and monitored 
4. WEB 2.0 APPLICATIONS/RICH INTERNET APPLICATIONS (RIA) 
Web 2.0 applications or Rich Internet Applications refer to all those web applications that facilitate participatory information sharing, interoperability, and collaboration on the World Wide Web. A Web 2.0 site allows users to interact and collaborate with each other in a social media dialogue as creators (prosumers) of user-generated content in a virtual community, in contrast to websites where users (consumers) are limited to the passive viewing of content that was created for them. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, web applications, podcasts, micro blogs, tags ,social bookmarks, RSS feeds, mashups and folksonomies. Web 2.0 can be used for socialization, information sharing or distribution and for application purposes. There are so many online communities like HR forum, Wiz IQ,Authorstream,MTC ,etc. which provide a platform for sharing knowledge and information among like minded people or people belonging to same profession. Social Networking Sites like Face book, Twitter, Orkut, Skype, LinkedIn and similar other sites link people together irrespective of their interests and professions. On these sites people can post widgets, blog, micro blog, Upload or download content in the form of documents, photos, music and videos .Registered members can even tag photos, express their likes or dislikes about any postings, give RSS feeds ,book mark pages and do many more things. Apart from all these it also has many technical applications like working virtually without physical presence, grid housing, content replication and the like.
ZENITH 
International Journal of Multidisciplinary Research 
Vol.2 Issue 2, February 2012, ISSN 2231 5780 
www.zenithresearch.org.in 285 
FIGURE-3 INDICATES SOME OF THE APPLICATIONS OF WEB 2.0 FACILITATING CYBER SLACKING IN ORGANIZATIONS- 
WEB 2.0 APPLICATIONS FACILITATING CYBER BLUDGING 
FIGURE-3: WEB 2.0 APPLICATIONS FACILITATING CYBER SLACKING IN ORGANIZATIONS 
Community 
 Forums 
 Blogs 
 Wikis 
 Q&A 
 IM/Chat 
Social Networking Sites (SNS) 
 Face book 
 Orkut 
 Twitter 
 Skype 
 Linked In 
Participation 
 Open Add-ons 
 Content contribution 
 Gestures 
 Collaboration 
Socialization 
Distribution 
Application 
Open Aplications 
 REST 
 SOAP 
 JSON 
 RSS 
 Others 
Widgets 
 Badges 
 Web widgets 
 Gadgets 
 Net Vibes 
 SNS 
Syndication 
 RSS 
 ATOM 
 Book marking 
 Galleries 
 Market places 
Database 
 MY SQL 
 Postgre SQL 
 Oracle 
 Others 
Application Tier 
 Gralls 
Content 
 Python 
 Java-J2EE 
 Others 
Miscellaneous 
 Virtual Works 
 Grid housing 
 PaaS 
 Content Replication 
 Mobile
ZENITH 
International Journal of Multidisciplinary Research 
Vol.2 Issue 2, February 2012, ISSN 2231 5780 
www.zenithresearch.org.in 286 
Employees‟ perspective of e-monitoring. 
 Employees find e-surveillance as an intrusion into their privacy at workplace. They feel that surfing net during free time shouldn‟t be treated as cyber loafing. It leads to relaxation and rejuvenation. 
 Monitoring leads to stress and increased blood pressure since employees feel that every action of theirs is continuously monitored 
 E-monitoring injects suspicion and hostility in the workplace which may in turn lead to employee resentment and Counter Productive Behaviour. 
 Employers should seek prior consent of the employees to monitor them as per the Electronic Communications Privacy Act(ECPA) of 1986 
 E-surveillance can strain the relationship between an employee and an employer. 
 It demoralizes the employees and this may lead to a decline in their productivity 
THE RATIONALE OF E-SURVEILLANCE Despite the employees‟ concerns and some setbacks, more than 75 percent of the companies in USA are adopting e- surveillance techniques to monitor their employees in order to discourage them from using internet, telephone and other workplace tools for personal works. The employers quote some valid reasons for e-monitoring in workplace. Some of them include- 
 To ensure that employees will not divulge with company trade secrets and intellectual property during their communication with others. 
 To prevent employees from making any defamatory or derogatory remarks against the company in their electronic correspondence. 
Positive Negative 
Productivity enhancement Privacy Intrusion 
Security leads to stress 
Legal Liability Hostility and resentment 
To prevent data loss and theft Employee Turnover 
Performance Review Loss of Trust 
FIGURE 4: IMPLICATIONS OF E-SURVEILLANCE
ZENITH 
International Journal of Multidisciplinary Research 
Vol.2 Issue 2, February 2012, ISSN 2231 5780 
www.zenithresearch.org.in 287 
 To stop employees from using their work time and technology for personal use. 
 To prevent criminal activities in workplace  The Electronic Communications Privacy Act (ECPA) passed in 1986 as an extension of the wiretap laws, permits employers to monitor electronic communications, such as e- mails, in two situations: where the employee has consented to the monitoring, and where the employer can show a legitimate business purpose for monitoring the employee e- mails. Not surprisingly, it is this second instance that garners the most legal attention.  It can be used as a proactive measure to head off problematic employee behaviour before it gets to a point where the company‟s business interests are affected.  To ensure data security while employees are engaged in social networking and while using web 2.0 applications.  To prevent workplace inefficiencies, malware, data loss and viruses as the main threats caused by insecure use of Web 2.0 applications like social networking, blogs and wikis.  Since the company owns the equipment and the office space, it has a right to monitor its employees to prevent misuse of that equipment and space.  To have total control over the networked computers. Start or terminate remote processes, run commands, copy files from remote systems or to even turn the computer off or restart it, not to mention logging off the current user  To track possible file thefts by employees on their flash drives.  The employees should not expect privacy while using company email/internet facilities.  The employer‟s ownership of resources naturally entitles them to monitor the way they want. Considering all the above factors, e-surveillance system has become indispensible for successful functioning of business organizations. It should become inherent policy in all companies across the globe since the benefits or outcomes of workplace monitoring are innumerable. Though initial resistance to monitoring is most likely to pop up, employees must be sensitized about the increasing need for it in greater interest of the organization. 
PERCEIVED BENEFITS OF E-SURVEILLANCE TO EMPLOYERS 
 It increases personnel productivity by eliminating personal use of internet, email, social networks and by preventing employees wasting work time 
 It protects the company from intellectual property and trade secret theft. 
 Protects the company from indulging in fraudulent activities
ZENITH 
International Journal of Multidisciplinary Research 
Vol.2 Issue 2, February 2012, ISSN 2231 5780 
www.zenithresearch.org.in 288 
 Useful to maintain a record of organizations electronic communication to meet the regulatory compliance requirements 
 E-surveillance facilitates the performance review of the employees based on their telephone skills and communication skills 
 It also helps to determine the deficiencies of the employees and helps to identify their training needs 
 It is useful for legal compliance and to meet the legal liability 
 Useful for quality control and improvement in the delivery of services 
CONCLUSION Both employees and employers have valid reasons to justify their claims but Firms should be prudent while electronically monitoring employee e-mails and Internet activities. They should be mindful of the delicate issues of trust and loyalty that should be addressed for smooth functioning of the organization. E-surveillance requires proper planning; clear policies, and detailed procedures. Both opponents and proponents of monitoring agree that organizations need clear and definitive policies on electronic surveillance, and that these policies should be frequently and clearly communicated to employees. They also agree that employees should undergo formal training on e-mail and Internet policies, proper usage, and conduct. Given the potential liability facing organizations as a result of the misuse of technology and resources of the organization by the employees, steps must be taken by managers and IT departments alike to mitigate the risks involved in allowing employees unfettered access to the Internet and company email systems. e- Surveillance system is indispensible in organizations since it secures the resources of the organization against any external legal liability and also enhances productivity by avoiding wastage of time through cyber bludging. Each and every organization in today‟s globalized era has to implement e-surveillance for effective monitoring and control of their workforce. References 
1. Adams, H., S. Scheuing, & S. Feeley, (2000)” E-Mail Monitoring in the Workplace: The Good, the Bad and the Ugly.” Defense Counsel Journal. 1, pg (32-46). 
2. Agarwal, R., & F. Rodhain, (2002).” Mine or Ours: Email Privacy Expectations, Employee Attitudes, and Perceived Work Environment Characteristics”. Proceedings of the 35th Hawaii International Conference on System Sciences, Hawaii. 
3. American Heritage Dictionary. 3rd Ed. (2000). Houghton Mifflin Company. Boston. 
4. Arendt, L. (2004). Keeping an Eye on Employees. Corporate Report Wisconsin, 19, pg(32-35).
ZENITH 
International Journal of Multidisciplinary Research 
Vol.2 Issue 2, February 2012, ISSN 2231 5780 
www.zenithresearch.org.in 289 
5. August, R., G. Ferrera, S. Lichtenstein, Reder, M., & W. Schiano, (2001). Cyber law Cincinnati, OH: South-Western College Publishing 
6. Armstrong, Larry," Someone to Watch 0ver You," Business Week, ro, 689, July 10,2000, pp. I 9-190, 
7. Blakey v. Continental Airlines, Inc. (1998). 2 F. Supp. 2d 598, 603 (D.N.J. 1998). 
8. Bouke v. Nissan Motor Co. (1993).No. B068705 (Cal. Court of App., 2nd Dist., July 26, 1993) 
9. Chieh, C., & B. Kleiner, (2003). How Organizations Manage the Issue of Employee Privacy 
10. Today. Management Research News, 26, 82-88. 
11. CIO Magazine. (1997). Pushing It. May 1, Retrieved April 10, 2005, from: 
12. Evers, J. (2005). Panel paints grim picture of cybercrime battle. News.com, June 1. 
13. Greenlaw, Paul S., and Prudeanu, Cornelia. "The Impact of Federal Legislation to Limit Electronic Monitoring." Public Personnel Management 26, 2 (June 22, 1997) p. 227. 
14. Hodson, T., F. Englander, & V. Englander, (1999). Ethical, Legal, and Economic Aspects of Employee Monitoring of Employee Email. Journal of Business Ethics, 1, 99-108. 
15. Information Week Online. (2000). Push Technology Matures – And Makes A Comeback. July 10, Retrieved April 10, 2005, from: http://www.informationweek.com/794/portal.htm 
16. Juline E.Miles & Bo Hu & Srikanth Beldona & Joan Clay “Cyberslacking! A Liability issue for Wired Workplaces:The Internet has brought more than distraction to the workplace.Employee”,Cornell Hotel & Restaurant Administration Quarterly, Oct- Nov,2001 
17. Kovach, K., J. Jordon, K. Tansey, & E. Framinan, (2000). The Balance Between Employee Privacy and Employer Interests. Business and Society Review, 2, 289-298. 
18. Lichtash, A., (2004). Inappropriate Use of E-mail and the Internet in the Workplace: The Arbitration Picture. Dispute Resolution Journal, 59, 26-36. 
19. Liebert, M., (2004). Development of a Measure of Personal Web Usage in the Workplace CyberPsychology & Behavior, 7, 93-104. 
20. Manning, Rita C. "Liberal and Communitarian Defenses of Workplace Privacy." Journal of Business Ethics 6, 8 (June 1997) p. 817.
ZENITH 
International Journal of Multidisciplinary Research 
Vol.2 Issue 2, February 2012, ISSN 2231 5780 
www.zenithresearch.org.in 290 
21. Martin, K., & R. Freeman, (2003). Some Problems with Employee Monitoring. Journal of Business Ethics. 4, 353 –361. 
22. Miller, S., & J. Weckert, (2000). Privacy, the Workplace and the Internet Journal of Business Ethics, 28, 255-265 
23. Morris, F., (2003). The Electronic Platform: Email and Other Privacy Issues in the Workplace Computer and Internet Lawyer, 20, 1-9. 
24. Muhl, C., (2003). Workplace e-mail and Internet use: employees and employers beware. Monthly Labor Review. 2, 36-45. 
25. Patton, S. (2004). Privacy is Your Business. CIO, June 1. 
26. Policy, S., (2000). Employer monitoring of employee Internet and email use: An Effective Litigation Avoidance Tool. Computer and Internet Law, 17, 21-23. 
27. Richman, D (2005). E-mails sent at work anything but private. (March 9) The Seattle Post-Intellgencerhttp://seattlepi.nwsource.com/business/215147_email09.html 
28. Segarnick, K. (2002). Courts Say It‟s Ok: Peep away. CIO, June 1. 
29. Smith, A., & R. Faley, (2001). Email Workplace Privacy Issues in an Information-and Knowledge-based Environment Southern Business Review, 27, 8-22.

More Related Content

What's hot

E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESIJNSA Journal
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...MZERMA Amine
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsCraig Walker, CISSP
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaksSocialKwan
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118AngelaHoltby
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01ijmnct
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 

What's hot (20)

E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
Security & Compliance for Startups
Security & Compliance for StartupsSecurity & Compliance for Startups
Security & Compliance for Startups
 
188
188188
188
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
IJSRED-V2I3P69
IJSRED-V2I3P69IJSRED-V2I3P69
IJSRED-V2I3P69
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
 
P50 fahl
P50 fahlP50 fahl
P50 fahl
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 

Viewers also liked

Questionnaire radio trailer
Questionnaire radio trailer Questionnaire radio trailer
Questionnaire radio trailer a2medgroup2
 
Incredible north & south India Tour Packages
Incredible north & south India Tour PackagesIncredible north & south India Tour Packages
Incredible north & south India Tour PackagesKata Travels
 
الأمر بالإتباع والنهي عن الإبتداع للإمام السيوطي
الأمر بالإتباع والنهي عن الإبتداع للإمام السيوطيالأمر بالإتباع والنهي عن الإبتداع للإمام السيوطي
الأمر بالإتباع والنهي عن الإبتداع للإمام السيوطيOm Muktar
 
คำวินิจฉัย (ฟัตวา) จุฬาราชมนตรี : การชำระล้างหรือทำความสะอาดวัตถุดิบ อุปกรณ์ผ...
คำวินิจฉัย (ฟัตวา) จุฬาราชมนตรี : การชำระล้างหรือทำความสะอาดวัตถุดิบ อุปกรณ์ผ...คำวินิจฉัย (ฟัตวา) จุฬาราชมนตรี : การชำระล้างหรือทำความสะอาดวัตถุดิบ อุปกรณ์ผ...
คำวินิจฉัย (ฟัตวา) จุฬาราชมนตรี : การชำระล้างหรือทำความสะอาดวัตถุดิบ อุปกรณ์ผ...Om Muktar
 
Nepal bhutan-srilanka
Nepal bhutan-srilankaNepal bhutan-srilanka
Nepal bhutan-srilankaKata Travels
 
Croquet Records - Nonprofit record label and band incubator
Croquet Records - Nonprofit record label and band incubatorCroquet Records - Nonprofit record label and band incubator
Croquet Records - Nonprofit record label and band incubatorCroquet Records
 
Potential interview
Potential interviewPotential interview
Potential interviewa2medgroup2
 
The Difference between Advising and Condemning
The Difference between Advising and Condemning The Difference between Advising and Condemning
The Difference between Advising and Condemning Om Muktar
 
Focus group magazine feedback
Focus group magazine feedbackFocus group magazine feedback
Focus group magazine feedbacka2medgroup2
 
Highlights of south india
Highlights of south indiaHighlights of south india
Highlights of south indiaKata Travels
 
Target audeince style
Target audeince styleTarget audeince style
Target audeince stylea2medgroup2
 
Social media catterson
Social media cattersonSocial media catterson
Social media cattersontaycatt
 
Conventions of media
Conventions of mediaConventions of media
Conventions of mediapetermarsh513
 
Focus group documenatry
Focus group documenatry Focus group documenatry
Focus group documenatry a2medgroup2
 

Viewers also liked (20)

Boe beng san djin
Boe beng san djinBoe beng san djin
Boe beng san djin
 
Questionnaire radio trailer
Questionnaire radio trailer Questionnaire radio trailer
Questionnaire radio trailer
 
Final proposal
Final proposalFinal proposal
Final proposal
 
Evaluation q3
Evaluation q3Evaluation q3
Evaluation q3
 
Incredible north & south India Tour Packages
Incredible north & south India Tour PackagesIncredible north & south India Tour Packages
Incredible north & south India Tour Packages
 
الأمر بالإتباع والنهي عن الإبتداع للإمام السيوطي
الأمر بالإتباع والنهي عن الإبتداع للإمام السيوطيالأمر بالإتباع والنهي عن الإبتداع للإمام السيوطي
الأمر بالإتباع والنهي عن الإبتداع للإمام السيوطي
 
คำวินิจฉัย (ฟัตวา) จุฬาราชมนตรี : การชำระล้างหรือทำความสะอาดวัตถุดิบ อุปกรณ์ผ...
คำวินิจฉัย (ฟัตวา) จุฬาราชมนตรี : การชำระล้างหรือทำความสะอาดวัตถุดิบ อุปกรณ์ผ...คำวินิจฉัย (ฟัตวา) จุฬาราชมนตรี : การชำระล้างหรือทำความสะอาดวัตถุดิบ อุปกรณ์ผ...
คำวินิจฉัย (ฟัตวา) จุฬาราชมนตรี : การชำระล้างหรือทำความสะอาดวัตถุดิบ อุปกรณ์ผ...
 
Nepal bhutan-srilanka
Nepal bhutan-srilankaNepal bhutan-srilanka
Nepal bhutan-srilanka
 
Croquet Records - Nonprofit record label and band incubator
Croquet Records - Nonprofit record label and band incubatorCroquet Records - Nonprofit record label and band incubator
Croquet Records - Nonprofit record label and band incubator
 
Potential interview
Potential interviewPotential interview
Potential interview
 
Valparaiso
ValparaisoValparaiso
Valparaiso
 
The Difference between Advising and Condemning
The Difference between Advising and Condemning The Difference between Advising and Condemning
The Difference between Advising and Condemning
 
Question 3
Question 3Question 3
Question 3
 
Focus group magazine feedback
Focus group magazine feedbackFocus group magazine feedback
Focus group magazine feedback
 
Highlights of south india
Highlights of south indiaHighlights of south india
Highlights of south india
 
Target audeince style
Target audeince styleTarget audeince style
Target audeince style
 
Social media catterson
Social media cattersonSocial media catterson
Social media catterson
 
Conventions of media
Conventions of mediaConventions of media
Conventions of media
 
Fungsi otot
Fungsi ototFungsi otot
Fungsi otot
 
Focus group documenatry
Focus group documenatry Focus group documenatry
Focus group documenatry
 

Similar to 21 zen vol2_issue2_feb12

IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET Journal
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docxdeanmtaylor1545
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...ijccsa
 
OFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDEROFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDERIRJET Journal
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)ChristopherAntonius
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxaudeleypearl
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical HackingIRJET Journal
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET Journal
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET Journal
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...IRJET Journal
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisIRJET Journal
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 

Similar to 21 zen vol2_issue2_feb12 (20)

IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
 
Student NameCYB110Playbook Runbook Parts 1-3S.docx
Student NameCYB110Playbook  Runbook Parts 1-3S.docxStudent NameCYB110Playbook  Runbook Parts 1-3S.docx
Student NameCYB110Playbook Runbook Parts 1-3S.docx
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
OFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDEROFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDER
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

21 zen vol2_issue2_feb12

  • 1. ZENITH International Journal of Multidisciplinary Research Vol.2 Issue 2, February 2012, ISSN 2231 5780 www.zenithresearch.org.in 281 THE TECHNIQUES AND RATIONALE OF E- SURVEILLANCE PRACTICES IN ORGANIZATIONS DR.AISHA M.SHERIFF*; MRS. GEETHA RAVISHANKAR** *Professor, Department of Studies in Business Administration, University Mysore. **Faculty, MBA Department, RJS Institute of Management Studies, Koramangala, Bangalore. ABSTRACT The conceptual paper entitled –“The Techniques and Rationale of e-Surveillance Practices in Organizations” elucidates some of the key ethical issues arising out of the use of surveillance technology in the workplace. Information age is steering the organizations towards increased use of online workforce. This has led to the extensive dependence on internet in the organizations. The advent of Web 2.0 applications have acted as facilitating factors for cyber loafing of online workforce. Since Web 2.0 applications induce interactive information sharing, interoperability and collaboration on the World Wide Web, employees are provoked to indulge in mailing, chatting, entering virtual world, social networking blogging, podcasting, Net-surfing, online trading and the like. This leads to loss of productivity and loss of work-time in organizations. To regulate such unethical practices of using organizational technology for employees‟ personal indulgences, most of the organizations across the globe have adopted work place surveillance systems to monitor erring employees with the help of surveillance devices and gadgets. Employees consider surveillance or monitoring system as intrusion into their privacy and unethical. They also claim that it is an indication of lack of trust in them. This paper discusses about some of the e-techniques used for employee surveillance in organizations and the rationale behind e-monitoring it. KERWORDS: Cyber bludging, Cyber loafing, Cyber slacking, e-Surveillance, Rich Internet Applications (RIA)., Web 2.0 applications ,Workplace Surveillance techniques. ______________________________________________________________________________ INTRODUCTION The recent strides in information technology has enabled use of several web 2.0 applications which are luring ,employees to indulge in Cyber slacking activities like sending personal emails, podcasting, blogging, chatting on Social Networking Sites(SNS) like face book, LinkedIn ,twitter orkut and others. Besides these, they also involve in unofficial browsing, online trading, shopping, gamming, checking stock prices, gambling, moonlighting and a host of other e-loafing activities. As a consequence, organizations are facing a slump in the productivity of their workforce. In order to enhance productivity and to discourage cyber loafing, most of the business organizations have instituted systematic and continuous scrutinizing in the workplace through electronic surveillance system.
  • 2. ZENITH International Journal of Multidisciplinary Research Vol.2 Issue 2, February 2012, ISSN 2231 5780 www.zenithresearch.org.in 282 OPERATIONAL DEFINITIONS 1.’CYBER SLACKING,’ „CYBER LOAFING,’ AND ‘CYBER BLUDGING’ are terms used to describe the activities involved in wasting time on the internet while people are supposedly at work. Cyber slacking is recreational web surfing on the job or using the internet at work for one's own purposes. This often leads to productivity loss, bandwidth degradation and exhaustive use of organizational resources. It may also result in legal liability to the employers and might expose to viruses spyware and malware .Posting defamatory content in chat rooms and news groups and sending emails under employer‟s domain can lead to legal liability to the employer. 2. WORKPLACE SURVEILLANCE is a means by which organizations monitor the activities of the employees with the help of Information technology (IT) enabled tools and devices. When IT applications are used in workplace monitoring it is known as e-surveillance. (Refer figure-2 for e-surveillance techniques). 3. E-Surveillance Techniques E-surveillance techniques refer to all those IT enabled surveillance techniques used in business establishments‟, shopping malls and Government organizations for the purpose of facilitating effective monitoring and surveillance. These techniques are mostly used- to avoid misuse of enterprise resources, to secure organizations against legal liability, to enhance productivity and to avoid loss of work time due to e-loafing practices. Checking stock Prices Cyber slacking activities In workplace Uploading and downloading content Unofficial Browsing Online Trading/Shopping Gamming and Gambling Sending personal mails Social Networking Blogging &Podcasting FIGURE-1: CYBER SLACKING ACTIVITIES OF EMPLOYEES IN WORKPLACE
  • 3. ZENITH International Journal of Multidisciplinary Research Vol.2 Issue 2, February 2012, ISSN 2231 5780 www.zenithresearch.org.in 283 The surveillance tools are generally called as web sleuths, spy agents, shadows or silent watchers. Some of the e-surveillance techniques used in organizations to monitor employees include –  Packet Sniffers, a diagnostic software programme that is used to scrutinize all the information that passes through the network to which it is connected. Packet sniffers can be setup with or without filters. They can monitor online activities like the sites visited, mails sent and received internet telephony and audio, video or textual downloads. They help in determining the work time lost due to cyber slacking.  Desktop Monitoring Devices are installed on the computer at the assembly level. They can intercept the signals and can replicate what the user is seeing or typing on the employer‟s desktop. Desktop monitoring software can be physically installed by someone or can be remotely installed by sending Trojan horse through email attachment. Hackers also use desktop monitors to record keystrokes and to steal personal data.  Log Files System Administrator will help to track and determine the websites visited by the employees‟ .It also detects emails sent and received and files downloaded. The log files can be retrieved even after deleting them. They can be found in operating systems, emails, web browsers and applications as back ups.  Closed Circuit Cameras are used in the workplace to monitor employees‟ activities. They are mainly used for security, training and monitoring purposes. More than 78% of US companies use CCTVs to monitor their workers. CCTVs will combat personal uses of office technology and devices. It saves time and money and enhances productivity of the organization.  Telephone tapping or Recording is done for quality assessment and for enhancing the telephonic skills of the employees. Telephone tapping helps the companies to prevent personal use of telephones.  Email filters Email filters are used as monitoring tools to filter and process both incoming and outgoing mails of employees in the workplace  Packet Sniffers  Desktop monitors  Log Files System Administrator  CCTVs  Telephone tapping or monitoring  E-mail filters  Surf Controllers  Activity Monitors FIGURE-2: E-SURVEILLANCE TECHNIQUES
  • 4. ZENITH International Journal of Multidisciplinary Research Vol.2 Issue 2, February 2012, ISSN 2231 5780 www.zenithresearch.org.in 284  Surf controllers will monitor, inspect and control billions of Web sites visited by employees‟ everyday in the workplace. It will also inspect their emails and other Internet- based communications periodically and provides web security against malware, spyware and viruses.  Activity Monitors are powerful employee monitoring tools that consist of server and client parts. Server can be installed on any computers in the entire Local Area Network (LAN) and the activities of employees on such computers can be spied and monitored 4. WEB 2.0 APPLICATIONS/RICH INTERNET APPLICATIONS (RIA) Web 2.0 applications or Rich Internet Applications refer to all those web applications that facilitate participatory information sharing, interoperability, and collaboration on the World Wide Web. A Web 2.0 site allows users to interact and collaborate with each other in a social media dialogue as creators (prosumers) of user-generated content in a virtual community, in contrast to websites where users (consumers) are limited to the passive viewing of content that was created for them. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, web applications, podcasts, micro blogs, tags ,social bookmarks, RSS feeds, mashups and folksonomies. Web 2.0 can be used for socialization, information sharing or distribution and for application purposes. There are so many online communities like HR forum, Wiz IQ,Authorstream,MTC ,etc. which provide a platform for sharing knowledge and information among like minded people or people belonging to same profession. Social Networking Sites like Face book, Twitter, Orkut, Skype, LinkedIn and similar other sites link people together irrespective of their interests and professions. On these sites people can post widgets, blog, micro blog, Upload or download content in the form of documents, photos, music and videos .Registered members can even tag photos, express their likes or dislikes about any postings, give RSS feeds ,book mark pages and do many more things. Apart from all these it also has many technical applications like working virtually without physical presence, grid housing, content replication and the like.
  • 5. ZENITH International Journal of Multidisciplinary Research Vol.2 Issue 2, February 2012, ISSN 2231 5780 www.zenithresearch.org.in 285 FIGURE-3 INDICATES SOME OF THE APPLICATIONS OF WEB 2.0 FACILITATING CYBER SLACKING IN ORGANIZATIONS- WEB 2.0 APPLICATIONS FACILITATING CYBER BLUDGING FIGURE-3: WEB 2.0 APPLICATIONS FACILITATING CYBER SLACKING IN ORGANIZATIONS Community  Forums  Blogs  Wikis  Q&A  IM/Chat Social Networking Sites (SNS)  Face book  Orkut  Twitter  Skype  Linked In Participation  Open Add-ons  Content contribution  Gestures  Collaboration Socialization Distribution Application Open Aplications  REST  SOAP  JSON  RSS  Others Widgets  Badges  Web widgets  Gadgets  Net Vibes  SNS Syndication  RSS  ATOM  Book marking  Galleries  Market places Database  MY SQL  Postgre SQL  Oracle  Others Application Tier  Gralls Content  Python  Java-J2EE  Others Miscellaneous  Virtual Works  Grid housing  PaaS  Content Replication  Mobile
  • 6. ZENITH International Journal of Multidisciplinary Research Vol.2 Issue 2, February 2012, ISSN 2231 5780 www.zenithresearch.org.in 286 Employees‟ perspective of e-monitoring.  Employees find e-surveillance as an intrusion into their privacy at workplace. They feel that surfing net during free time shouldn‟t be treated as cyber loafing. It leads to relaxation and rejuvenation.  Monitoring leads to stress and increased blood pressure since employees feel that every action of theirs is continuously monitored  E-monitoring injects suspicion and hostility in the workplace which may in turn lead to employee resentment and Counter Productive Behaviour.  Employers should seek prior consent of the employees to monitor them as per the Electronic Communications Privacy Act(ECPA) of 1986  E-surveillance can strain the relationship between an employee and an employer.  It demoralizes the employees and this may lead to a decline in their productivity THE RATIONALE OF E-SURVEILLANCE Despite the employees‟ concerns and some setbacks, more than 75 percent of the companies in USA are adopting e- surveillance techniques to monitor their employees in order to discourage them from using internet, telephone and other workplace tools for personal works. The employers quote some valid reasons for e-monitoring in workplace. Some of them include-  To ensure that employees will not divulge with company trade secrets and intellectual property during their communication with others.  To prevent employees from making any defamatory or derogatory remarks against the company in their electronic correspondence. Positive Negative Productivity enhancement Privacy Intrusion Security leads to stress Legal Liability Hostility and resentment To prevent data loss and theft Employee Turnover Performance Review Loss of Trust FIGURE 4: IMPLICATIONS OF E-SURVEILLANCE
  • 7. ZENITH International Journal of Multidisciplinary Research Vol.2 Issue 2, February 2012, ISSN 2231 5780 www.zenithresearch.org.in 287  To stop employees from using their work time and technology for personal use.  To prevent criminal activities in workplace  The Electronic Communications Privacy Act (ECPA) passed in 1986 as an extension of the wiretap laws, permits employers to monitor electronic communications, such as e- mails, in two situations: where the employee has consented to the monitoring, and where the employer can show a legitimate business purpose for monitoring the employee e- mails. Not surprisingly, it is this second instance that garners the most legal attention.  It can be used as a proactive measure to head off problematic employee behaviour before it gets to a point where the company‟s business interests are affected.  To ensure data security while employees are engaged in social networking and while using web 2.0 applications.  To prevent workplace inefficiencies, malware, data loss and viruses as the main threats caused by insecure use of Web 2.0 applications like social networking, blogs and wikis.  Since the company owns the equipment and the office space, it has a right to monitor its employees to prevent misuse of that equipment and space.  To have total control over the networked computers. Start or terminate remote processes, run commands, copy files from remote systems or to even turn the computer off or restart it, not to mention logging off the current user  To track possible file thefts by employees on their flash drives.  The employees should not expect privacy while using company email/internet facilities.  The employer‟s ownership of resources naturally entitles them to monitor the way they want. Considering all the above factors, e-surveillance system has become indispensible for successful functioning of business organizations. It should become inherent policy in all companies across the globe since the benefits or outcomes of workplace monitoring are innumerable. Though initial resistance to monitoring is most likely to pop up, employees must be sensitized about the increasing need for it in greater interest of the organization. PERCEIVED BENEFITS OF E-SURVEILLANCE TO EMPLOYERS  It increases personnel productivity by eliminating personal use of internet, email, social networks and by preventing employees wasting work time  It protects the company from intellectual property and trade secret theft.  Protects the company from indulging in fraudulent activities
  • 8. ZENITH International Journal of Multidisciplinary Research Vol.2 Issue 2, February 2012, ISSN 2231 5780 www.zenithresearch.org.in 288  Useful to maintain a record of organizations electronic communication to meet the regulatory compliance requirements  E-surveillance facilitates the performance review of the employees based on their telephone skills and communication skills  It also helps to determine the deficiencies of the employees and helps to identify their training needs  It is useful for legal compliance and to meet the legal liability  Useful for quality control and improvement in the delivery of services CONCLUSION Both employees and employers have valid reasons to justify their claims but Firms should be prudent while electronically monitoring employee e-mails and Internet activities. They should be mindful of the delicate issues of trust and loyalty that should be addressed for smooth functioning of the organization. E-surveillance requires proper planning; clear policies, and detailed procedures. Both opponents and proponents of monitoring agree that organizations need clear and definitive policies on electronic surveillance, and that these policies should be frequently and clearly communicated to employees. They also agree that employees should undergo formal training on e-mail and Internet policies, proper usage, and conduct. Given the potential liability facing organizations as a result of the misuse of technology and resources of the organization by the employees, steps must be taken by managers and IT departments alike to mitigate the risks involved in allowing employees unfettered access to the Internet and company email systems. e- Surveillance system is indispensible in organizations since it secures the resources of the organization against any external legal liability and also enhances productivity by avoiding wastage of time through cyber bludging. Each and every organization in today‟s globalized era has to implement e-surveillance for effective monitoring and control of their workforce. References 1. Adams, H., S. Scheuing, & S. Feeley, (2000)” E-Mail Monitoring in the Workplace: The Good, the Bad and the Ugly.” Defense Counsel Journal. 1, pg (32-46). 2. Agarwal, R., & F. Rodhain, (2002).” Mine or Ours: Email Privacy Expectations, Employee Attitudes, and Perceived Work Environment Characteristics”. Proceedings of the 35th Hawaii International Conference on System Sciences, Hawaii. 3. American Heritage Dictionary. 3rd Ed. (2000). Houghton Mifflin Company. Boston. 4. Arendt, L. (2004). Keeping an Eye on Employees. Corporate Report Wisconsin, 19, pg(32-35).
  • 9. ZENITH International Journal of Multidisciplinary Research Vol.2 Issue 2, February 2012, ISSN 2231 5780 www.zenithresearch.org.in 289 5. August, R., G. Ferrera, S. Lichtenstein, Reder, M., & W. Schiano, (2001). Cyber law Cincinnati, OH: South-Western College Publishing 6. Armstrong, Larry," Someone to Watch 0ver You," Business Week, ro, 689, July 10,2000, pp. I 9-190, 7. Blakey v. Continental Airlines, Inc. (1998). 2 F. Supp. 2d 598, 603 (D.N.J. 1998). 8. Bouke v. Nissan Motor Co. (1993).No. B068705 (Cal. Court of App., 2nd Dist., July 26, 1993) 9. Chieh, C., & B. Kleiner, (2003). How Organizations Manage the Issue of Employee Privacy 10. Today. Management Research News, 26, 82-88. 11. CIO Magazine. (1997). Pushing It. May 1, Retrieved April 10, 2005, from: 12. Evers, J. (2005). Panel paints grim picture of cybercrime battle. News.com, June 1. 13. Greenlaw, Paul S., and Prudeanu, Cornelia. "The Impact of Federal Legislation to Limit Electronic Monitoring." Public Personnel Management 26, 2 (June 22, 1997) p. 227. 14. Hodson, T., F. Englander, & V. Englander, (1999). Ethical, Legal, and Economic Aspects of Employee Monitoring of Employee Email. Journal of Business Ethics, 1, 99-108. 15. Information Week Online. (2000). Push Technology Matures – And Makes A Comeback. July 10, Retrieved April 10, 2005, from: http://www.informationweek.com/794/portal.htm 16. Juline E.Miles & Bo Hu & Srikanth Beldona & Joan Clay “Cyberslacking! A Liability issue for Wired Workplaces:The Internet has brought more than distraction to the workplace.Employee”,Cornell Hotel & Restaurant Administration Quarterly, Oct- Nov,2001 17. Kovach, K., J. Jordon, K. Tansey, & E. Framinan, (2000). The Balance Between Employee Privacy and Employer Interests. Business and Society Review, 2, 289-298. 18. Lichtash, A., (2004). Inappropriate Use of E-mail and the Internet in the Workplace: The Arbitration Picture. Dispute Resolution Journal, 59, 26-36. 19. Liebert, M., (2004). Development of a Measure of Personal Web Usage in the Workplace CyberPsychology & Behavior, 7, 93-104. 20. Manning, Rita C. "Liberal and Communitarian Defenses of Workplace Privacy." Journal of Business Ethics 6, 8 (June 1997) p. 817.
  • 10. ZENITH International Journal of Multidisciplinary Research Vol.2 Issue 2, February 2012, ISSN 2231 5780 www.zenithresearch.org.in 290 21. Martin, K., & R. Freeman, (2003). Some Problems with Employee Monitoring. Journal of Business Ethics. 4, 353 –361. 22. Miller, S., & J. Weckert, (2000). Privacy, the Workplace and the Internet Journal of Business Ethics, 28, 255-265 23. Morris, F., (2003). The Electronic Platform: Email and Other Privacy Issues in the Workplace Computer and Internet Lawyer, 20, 1-9. 24. Muhl, C., (2003). Workplace e-mail and Internet use: employees and employers beware. Monthly Labor Review. 2, 36-45. 25. Patton, S. (2004). Privacy is Your Business. CIO, June 1. 26. Policy, S., (2000). Employer monitoring of employee Internet and email use: An Effective Litigation Avoidance Tool. Computer and Internet Law, 17, 21-23. 27. Richman, D (2005). E-mails sent at work anything but private. (March 9) The Seattle Post-Intellgencerhttp://seattlepi.nwsource.com/business/215147_email09.html 28. Segarnick, K. (2002). Courts Say It‟s Ok: Peep away. CIO, June 1. 29. Smith, A., & R. Faley, (2001). Email Workplace Privacy Issues in an Information-and Knowledge-based Environment Southern Business Review, 27, 8-22.