logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

The Visible Employee Using Workplace Monitoring And Surveillance To Protect Information Assetswithout Compromising Employee Privacy Or Trust Jeffrey M Stanton

  • SKU: BELL-1633920
The Visible Employee Using Workplace Monitoring And Surveillance To Protect Information Assetswithout Compromising Employee Privacy Or Trust Jeffrey M Stanton
$ 31.00 $ 45.00 (-31%)

0.0

0 reviews

The Visible Employee Using Workplace Monitoring And Surveillance To Protect Information Assetswithout Compromising Employee Privacy Or Trust Jeffrey M Stanton instant download after payment.

Publisher: Information Today, Inc.
File Extension: PDF
File size: 1.42 MB
Pages: 272
Author: Jeffrey M. Stanton, Kathryn R. Stam
ISBN: 9780910965743, 9781573879521, 0910965749, 1573879525
Language: English
Year: 2006

Product desciption

The Visible Employee Using Workplace Monitoring And Surveillance To Protect Information Assetswithout Compromising Employee Privacy Or Trust Jeffrey M Stanton by Jeffrey M. Stanton, Kathryn R. Stam 9780910965743, 9781573879521, 0910965749, 1573879525 instant download after payment.

For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workers—either through error or by intent—is discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security solutions for at-risk organizations but also the perceptions and attitudes of employees toward workplace surveillance.

Related Products