SlideShare a Scribd company logo
1 of 2
Name: __________________ Date: ____________________
How Workplace Surveillance Works
Obtained on Sept. 13, 2007 from: http://computer.howstuffworks.com/workplace-surveillance.htm
Introduction to How Workplace Surveillance Works
1. What activities are considered as cyberslacking according to the article?
• Personal emails
• Playing games
• Watching pornography
• Shopping
• Checking stock prices
• Gambling
2. Do you think it is an ethical practice for an employer to track the websites that
you may be going to at work? Explain why or why not.
• Yes, because the employer hires people who he thinks will benefit the
company’s image and if the manager finds out that the employee is
acting different online than he does in person then the employer can
fire said employee.
A Growing Trend
3. Why do you think that employers are tracking the activities of their
employees?
• To see if the employees are making proper use of the company’s time
because time is money and also to see if the upholding the image of
the company.
4. What are the five methods that employers can use to track employee
activities:
• Packet sniffer
• Log files
• Desktop monitoring programs
• Phones
• Closed circuit cameras
5. What is a packet sniffer?
• A packet sniffer is a program that can see all of the information passing
over a network, the programs looks at it, or “sniffs”, each packet. A
packet is a part of a message that has broken up.
6. A packet sniffer located at one of the servers of your ISP would potentially
be able to monitor all of your online activities, such as:
• Which web sites you visit
• What you look on at the site
• Whom you send emails to
• What’s in the e-mail you sent
• What you download from the site
Name: __________________ Date: ____________________
• What streaming events you use, such as audio, video and internet
telephony.
Desktop Monitoring
7. Describe how a desktop monitoring system would monitor employees.
• Every time you provide some sort of input for your computer a
signal is transmitted. These signals can be intercepted by desktop
monitoring system.
8. Explain how log files work?
• They store the websites and information of everything you have
done for ex:, emails both received and sent, applications and
downloadable files
9. Where can log files be found?
• Operating system
• Web browser
• Application
• E-mail
Traditional Eavesdropping
10.Describe how employers eavesdrop on their employees.
• Phone calls
• Storing and reviewing emails and voicemails
• Video recording employees during job
11.Currently, 78 percent of all companies use some type of surveillance
system. Here is a breakdown of the methods they use:
• Storing and reviewing computer files: 36%
• Video recording employees:15%
• Recording and reviewing phone calls:12%
• Storing and reviewing voice mails :8%

More Related Content

Similar to How Workplace Surveillance Works Explained

User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...Jason Hong
 
Digital innovation-summit roi-of-ai-sept2017_v3
Digital innovation-summit roi-of-ai-sept2017_v3Digital innovation-summit roi-of-ai-sept2017_v3
Digital innovation-summit roi-of-ai-sept2017_v3BrightEdge
 
Connection and Context: ROI of AI for Digital Marketing
Connection and Context: ROI of AI for Digital MarketingConnection and Context: ROI of AI for Digital Marketing
Connection and Context: ROI of AI for Digital MarketingMarianne Sweeny
 
So you want a website
So you want a websiteSo you want a website
So you want a websiteMarisa McCall
 
Case Study
Case StudyCase Study
Case Studylaze
 
Web Tracking in cyber security and network security
Web Tracking in cyber security and  network securityWeb Tracking in cyber security and  network security
Web Tracking in cyber security and network securityHRJEETSINGH
 
A privacy tool
A privacy toolA privacy tool
A privacy toolGuang Mo
 
How to create a successful proof of concept
How to create a successful proof of conceptHow to create a successful proof of concept
How to create a successful proof of conceptETLSolutions
 
Top 7 Mistakes in Performance Testing
Top 7 Mistakes in Performance TestingTop 7 Mistakes in Performance Testing
Top 7 Mistakes in Performance Testingstuartmoncrieff
 
4.1 systems analysis
4.1 systems analysis4.1 systems analysis
4.1 systems analysisMomina Mateen
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
major project property management ppt
major project property management pptmajor project property management ppt
major project property management pptankonline
 
Pentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated TestingPentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated TestingAndrew McNicol
 

Similar to How Workplace Surveillance Works Explained (20)

User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
 
Digital innovation-summit roi-of-ai-sept2017_v3
Digital innovation-summit roi-of-ai-sept2017_v3Digital innovation-summit roi-of-ai-sept2017_v3
Digital innovation-summit roi-of-ai-sept2017_v3
 
Connection and Context: ROI of AI for Digital Marketing
Connection and Context: ROI of AI for Digital MarketingConnection and Context: ROI of AI for Digital Marketing
Connection and Context: ROI of AI for Digital Marketing
 
Placement zone
Placement zonePlacement zone
Placement zone
 
5years
5years5years
5years
 
So you want a website
So you want a websiteSo you want a website
So you want a website
 
Web identity part1
Web identity part1Web identity part1
Web identity part1
 
Case Study
Case StudyCase Study
Case Study
 
Web Tracking in cyber security and network security
Web Tracking in cyber security and  network securityWeb Tracking in cyber security and  network security
Web Tracking in cyber security and network security
 
What is web scraping?
What is web scraping?What is web scraping?
What is web scraping?
 
A privacy tool
A privacy toolA privacy tool
A privacy tool
 
SFC 2019
SFC 2019SFC 2019
SFC 2019
 
Real World SharePoint Debacles
Real World SharePoint DebaclesReal World SharePoint Debacles
Real World SharePoint Debacles
 
How to create a successful proof of concept
How to create a successful proof of conceptHow to create a successful proof of concept
How to create a successful proof of concept
 
Top 7 Mistakes in Performance Testing
Top 7 Mistakes in Performance TestingTop 7 Mistakes in Performance Testing
Top 7 Mistakes in Performance Testing
 
amansingh.docx
amansingh.docxamansingh.docx
amansingh.docx
 
4.1 systems analysis
4.1 systems analysis4.1 systems analysis
4.1 systems analysis
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
major project property management ppt
major project property management pptmajor project property management ppt
major project property management ppt
 
Pentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated TestingPentesting Tips: Beyond Automated Testing
Pentesting Tips: Beyond Automated Testing
 

Recently uploaded

BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 

Recently uploaded (20)

BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 

How Workplace Surveillance Works Explained

  • 1. Name: __________________ Date: ____________________ How Workplace Surveillance Works Obtained on Sept. 13, 2007 from: http://computer.howstuffworks.com/workplace-surveillance.htm Introduction to How Workplace Surveillance Works 1. What activities are considered as cyberslacking according to the article? • Personal emails • Playing games • Watching pornography • Shopping • Checking stock prices • Gambling 2. Do you think it is an ethical practice for an employer to track the websites that you may be going to at work? Explain why or why not. • Yes, because the employer hires people who he thinks will benefit the company’s image and if the manager finds out that the employee is acting different online than he does in person then the employer can fire said employee. A Growing Trend 3. Why do you think that employers are tracking the activities of their employees? • To see if the employees are making proper use of the company’s time because time is money and also to see if the upholding the image of the company. 4. What are the five methods that employers can use to track employee activities: • Packet sniffer • Log files • Desktop monitoring programs • Phones • Closed circuit cameras 5. What is a packet sniffer? • A packet sniffer is a program that can see all of the information passing over a network, the programs looks at it, or “sniffs”, each packet. A packet is a part of a message that has broken up. 6. A packet sniffer located at one of the servers of your ISP would potentially be able to monitor all of your online activities, such as: • Which web sites you visit • What you look on at the site • Whom you send emails to • What’s in the e-mail you sent • What you download from the site
  • 2. Name: __________________ Date: ____________________ • What streaming events you use, such as audio, video and internet telephony. Desktop Monitoring 7. Describe how a desktop monitoring system would monitor employees. • Every time you provide some sort of input for your computer a signal is transmitted. These signals can be intercepted by desktop monitoring system. 8. Explain how log files work? • They store the websites and information of everything you have done for ex:, emails both received and sent, applications and downloadable files 9. Where can log files be found? • Operating system • Web browser • Application • E-mail Traditional Eavesdropping 10.Describe how employers eavesdrop on their employees. • Phone calls • Storing and reviewing emails and voicemails • Video recording employees during job 11.Currently, 78 percent of all companies use some type of surveillance system. Here is a breakdown of the methods they use: • Storing and reviewing computer files: 36% • Video recording employees:15% • Recording and reviewing phone calls:12% • Storing and reviewing voice mails :8%