SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Name: __________________ Date: ____________________
How Workplace Surveillance Works
Obtained on Sept. 13, 2007 from: http://computer.howstuffworks.com/workplace-surveillance.htm
Introduction to How Workplace Surveillance Works
1. What activities are considered as cyberslacking according to the article?
Activities considered as cyber slacking is sending personal e-mails, playing games,
viewing pornography, shopping, checking stock prices and gambling online during
working hours.
2. Do you think it is an ethical practice for an employer to track the websites that
you may be going to at work? Explain why or why not.
I do think that it is an ethical practice for an employer to track the websites
because the employer needs to know which employee is being productive and
using their time wisely. It isn’t fair to the employees that do their work properly and
productively, while others go on sites they aren’t supposed to be on and they
both get the same pay.
A Growing Trend
3. Why do you think that employers are tracking the activities of their
employees?
Employers are also watching their workers to avoid sexual harassment and
discrimination lawsuits that stem from inappropriate and offensive e-mails circulating
within a company.
4. What are the five methods that employers can use to track employee
activities:
• Packet sniffers
• Log files
• Desktop monitoring programs
• Phones
• Closed-circuit cameras
5. What is a packet sniffer?
A packet sniffer is a program that can see all of the information passing over the
network it is connected to. As data streams back and forth on the network, the
program looks at, or "sniffs," each packet.
6. A packet sniffer located at one of the servers of your ISP would potentially be
able to monitor all of your online activities, such as:
• Which Web sites you visit
• What you look at on the site
• Whom you send e-mail to
• What's in the e-mail you send
• What you download from a site
Name: __________________ Date: ____________________
• What streaming events you use, such as audio, video and Internet telephony
Desktop Monitoring
7. Describe how a desktop monitoring system would monitor employees.
Desktop monitoring programs have the ability to record every keystroke. When you
are typing, a signal is sent from the keyboard to the application you are working in.
This signal can be intercepted and either streamed back to the person who installed
the monitoring program or recorded and sent back in a text file.
8. Explain how log files work?
A system administrator can determine what Web sites you've accessed, whom you
are sending e-mails to and receiving e-mails from and what applications are being
used.
9. Where can log files be found?
• Operating systems
• Web browsers (in the form of a cache)
• Applications (in the form of backups)
• E-mail
Traditional Eavesdropping
10.Describe how employers eavesdrop on their employees.
Employers eavesdrop on their employees by listening through phone calls or placing
a video camera in the employees work space.
11.Currently, 78 percent of all companies use some type of surveillance system.
Here is a breakdown of the methods they use:
• Storing and reviewing computer files: 36 percent
• Video-recording employees: 15 percent
• Recording and reviewing phone calls: 12 percent
• Storing and reviewing voice mail: 8 percent

Más contenido relacionado

Ähnlich wie How workplace surveillance works katrina hunos

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...ijcseit
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET Journal
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing AttacksPECB
 
PRACTICAL CONNECTION ASSIGNMENT Original source of fact patter
PRACTICAL CONNECTION ASSIGNMENT Original source of fact patterPRACTICAL CONNECTION ASSIGNMENT Original source of fact patter
PRACTICAL CONNECTION ASSIGNMENT Original source of fact patteranhcrowley
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos Beretas
 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...PROIDEA
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilitiesOWASP
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?ONE BCG
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary AlgorithmsIRJET Journal
 
Test execution
Test executionTest execution
Test executionadarsh j
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Using Auras ( Multimedia Overlays Created By The Aurasma
Using Auras ( Multimedia Overlays Created By The AurasmaUsing Auras ( Multimedia Overlays Created By The Aurasma
Using Auras ( Multimedia Overlays Created By The AurasmaElizabeth Jenkins
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarDr. Shivashankar
 
Achievement summary during 2017 start with intro about IT depart.docx
Achievement  summary during 2017 start with intro about IT depart.docxAchievement  summary during 2017 start with intro about IT depart.docx
Achievement summary during 2017 start with intro about IT depart.docxnettletondevon
 
Fingerprint Alert System A Solution for Effective Management System
Fingerprint Alert System A Solution for Effective Management SystemFingerprint Alert System A Solution for Effective Management System
Fingerprint Alert System A Solution for Effective Management Systemijtsrd
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine LearningIRJET Journal
 

Ähnlich wie How workplace surveillance works katrina hunos (20)

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 
PRACTICAL CONNECTION ASSIGNMENT Original source of fact patter
PRACTICAL CONNECTION ASSIGNMENT Original source of fact patterPRACTICAL CONNECTION ASSIGNMENT Original source of fact patter
PRACTICAL CONNECTION ASSIGNMENT Original source of fact patter
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
 
Test execution
Test executionTest execution
Test execution
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Using Auras ( Multimedia Overlays Created By The Aurasma
Using Auras ( Multimedia Overlays Created By The AurasmaUsing Auras ( Multimedia Overlays Created By The Aurasma
Using Auras ( Multimedia Overlays Created By The Aurasma
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. Shivashankar
 
Dynamic watermarking
Dynamic watermarkingDynamic watermarking
Dynamic watermarking
 
Achievement summary during 2017 start with intro about IT depart.docx
Achievement  summary during 2017 start with intro about IT depart.docxAchievement  summary during 2017 start with intro about IT depart.docx
Achievement summary during 2017 start with intro about IT depart.docx
 
Fingerprint Alert System A Solution for Effective Management System
Fingerprint Alert System A Solution for Effective Management SystemFingerprint Alert System A Solution for Effective Management System
Fingerprint Alert System A Solution for Effective Management System
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine Learning
 
Placement zone
Placement zonePlacement zone
Placement zone
 
Security testing
Security testingSecurity testing
Security testing
 

Último

LAUNCH: Intersections between violence against children and violence against ...
LAUNCH: Intersections between violence against children and violence against ...LAUNCH: Intersections between violence against children and violence against ...
LAUNCH: Intersections between violence against children and violence against ...UNICEF Office of Research - Innocenti
 
Evaluating LLM Models for Production Systems Methods and Practices -
Evaluating LLM Models for Production Systems Methods and Practices -Evaluating LLM Models for Production Systems Methods and Practices -
Evaluating LLM Models for Production Systems Methods and Practices -alopatenko
 
DAY 06 A Revelation 03-10-2024 PpPT.pptx
DAY 06 A Revelation 03-10-2024 PpPT.pptxDAY 06 A Revelation 03-10-2024 PpPT.pptx
DAY 06 A Revelation 03-10-2024 PpPT.pptxFamilyWorshipCenterD
 
BaruwaRaquella_Retail Store Presentation.pptx
BaruwaRaquella_Retail Store Presentation.pptxBaruwaRaquella_Retail Store Presentation.pptx
BaruwaRaquella_Retail Store Presentation.pptxRaquellaBaruwa
 
Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...
Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...
Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...Kayode Fayemi
 
wonder woman:quiz on female achievements
wonder woman:quiz on female achievementswonder woman:quiz on female achievements
wonder woman:quiz on female achievementsRemya Roshni
 
Retail marketing Supply chain management SLIDESHARE.pptx
Retail marketing Supply chain management SLIDESHARE.pptxRetail marketing Supply chain management SLIDESHARE.pptx
Retail marketing Supply chain management SLIDESHARE.pptxBharathBunny10
 
110 Philippines. quiz bee Power PoInt Presentation
110 Philippines. quiz bee Power PoInt Presentation110 Philippines. quiz bee Power PoInt Presentation
110 Philippines. quiz bee Power PoInt PresentationNorHaiFatun
 
2024 QRC PLM Recruitment Praesentation.pdf
2024 QRC PLM Recruitment Praesentation.pdf2024 QRC PLM Recruitment Praesentation.pdf
2024 QRC PLM Recruitment Praesentation.pdfJoerg Speikamp
 
Self Editing Your Novel Part 3: Who's Telling This Story?
Self Editing Your Novel Part 3: Who's Telling This Story?Self Editing Your Novel Part 3: Who's Telling This Story?
Self Editing Your Novel Part 3: Who's Telling This Story?Beth Jusino
 

Último (12)

LAUNCH: Intersections between violence against children and violence against ...
LAUNCH: Intersections between violence against children and violence against ...LAUNCH: Intersections between violence against children and violence against ...
LAUNCH: Intersections between violence against children and violence against ...
 
Evaluating LLM Models for Production Systems Methods and Practices -
Evaluating LLM Models for Production Systems Methods and Practices -Evaluating LLM Models for Production Systems Methods and Practices -
Evaluating LLM Models for Production Systems Methods and Practices -
 
DAY 06 A Revelation 03-10-2024 PpPT.pptx
DAY 06 A Revelation 03-10-2024 PpPT.pptxDAY 06 A Revelation 03-10-2024 PpPT.pptx
DAY 06 A Revelation 03-10-2024 PpPT.pptx
 
BaruwaRaquella_Retail Store Presentation.pptx
BaruwaRaquella_Retail Store Presentation.pptxBaruwaRaquella_Retail Store Presentation.pptx
BaruwaRaquella_Retail Store Presentation.pptx
 
Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...
Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...
Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...
 
wonder woman:quiz on female achievements
wonder woman:quiz on female achievementswonder woman:quiz on female achievements
wonder woman:quiz on female achievements
 
Tethex Cards - complete presentation in English
Tethex Cards - complete presentation in EnglishTethex Cards - complete presentation in English
Tethex Cards - complete presentation in English
 
Retail marketing Supply chain management SLIDESHARE.pptx
Retail marketing Supply chain management SLIDESHARE.pptxRetail marketing Supply chain management SLIDESHARE.pptx
Retail marketing Supply chain management SLIDESHARE.pptx
 
110 Philippines. quiz bee Power PoInt Presentation
110 Philippines. quiz bee Power PoInt Presentation110 Philippines. quiz bee Power PoInt Presentation
110 Philippines. quiz bee Power PoInt Presentation
 
NOC_SXSW_Non-ObviousThinking_2024_SLIDES.pptx
NOC_SXSW_Non-ObviousThinking_2024_SLIDES.pptxNOC_SXSW_Non-ObviousThinking_2024_SLIDES.pptx
NOC_SXSW_Non-ObviousThinking_2024_SLIDES.pptx
 
2024 QRC PLM Recruitment Praesentation.pdf
2024 QRC PLM Recruitment Praesentation.pdf2024 QRC PLM Recruitment Praesentation.pdf
2024 QRC PLM Recruitment Praesentation.pdf
 
Self Editing Your Novel Part 3: Who's Telling This Story?
Self Editing Your Novel Part 3: Who's Telling This Story?Self Editing Your Novel Part 3: Who's Telling This Story?
Self Editing Your Novel Part 3: Who's Telling This Story?
 

How workplace surveillance works katrina hunos

  • 1. Name: __________________ Date: ____________________ How Workplace Surveillance Works Obtained on Sept. 13, 2007 from: http://computer.howstuffworks.com/workplace-surveillance.htm Introduction to How Workplace Surveillance Works 1. What activities are considered as cyberslacking according to the article? Activities considered as cyber slacking is sending personal e-mails, playing games, viewing pornography, shopping, checking stock prices and gambling online during working hours. 2. Do you think it is an ethical practice for an employer to track the websites that you may be going to at work? Explain why or why not. I do think that it is an ethical practice for an employer to track the websites because the employer needs to know which employee is being productive and using their time wisely. It isn’t fair to the employees that do their work properly and productively, while others go on sites they aren’t supposed to be on and they both get the same pay. A Growing Trend 3. Why do you think that employers are tracking the activities of their employees? Employers are also watching their workers to avoid sexual harassment and discrimination lawsuits that stem from inappropriate and offensive e-mails circulating within a company. 4. What are the five methods that employers can use to track employee activities: • Packet sniffers • Log files • Desktop monitoring programs • Phones • Closed-circuit cameras 5. What is a packet sniffer? A packet sniffer is a program that can see all of the information passing over the network it is connected to. As data streams back and forth on the network, the program looks at, or "sniffs," each packet. 6. A packet sniffer located at one of the servers of your ISP would potentially be able to monitor all of your online activities, such as: • Which Web sites you visit • What you look at on the site • Whom you send e-mail to • What's in the e-mail you send • What you download from a site
  • 2. Name: __________________ Date: ____________________ • What streaming events you use, such as audio, video and Internet telephony Desktop Monitoring 7. Describe how a desktop monitoring system would monitor employees. Desktop monitoring programs have the ability to record every keystroke. When you are typing, a signal is sent from the keyboard to the application you are working in. This signal can be intercepted and either streamed back to the person who installed the monitoring program or recorded and sent back in a text file. 8. Explain how log files work? A system administrator can determine what Web sites you've accessed, whom you are sending e-mails to and receiving e-mails from and what applications are being used. 9. Where can log files be found? • Operating systems • Web browsers (in the form of a cache) • Applications (in the form of backups) • E-mail Traditional Eavesdropping 10.Describe how employers eavesdrop on their employees. Employers eavesdrop on their employees by listening through phone calls or placing a video camera in the employees work space. 11.Currently, 78 percent of all companies use some type of surveillance system. Here is a breakdown of the methods they use: • Storing and reviewing computer files: 36 percent • Video-recording employees: 15 percent • Recording and reviewing phone calls: 12 percent • Storing and reviewing voice mail: 8 percent