SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Name: __________________ Date: ____________________
How Workplace Surveillance Works
Obtained on Sept. 13, 2007 from: http://computer.howstuffworks.com/workplace-surveillance.htm
Introduction to How Workplace Surveillance Works
1. What activities are considered as cyberslacking according to the article?
Activities considered as cyber slacking is sending personal e-mails, playing games,
viewing pornography, shopping, checking stock prices and gambling online during
working hours.
2. Do you think it is an ethical practice for an employer to track the websites that
you may be going to at work? Explain why or why not.
I do think that it is an ethical practice for an employer to track the websites
because the employer needs to know which employee is being productive and
using their time wisely. It isn’t fair to the employees that do their work properly and
productively, while others go on sites they aren’t supposed to be on and they
both get the same pay.
A Growing Trend
3. Why do you think that employers are tracking the activities of their
employees?
Employers are also watching their workers to avoid sexual harassment and
discrimination lawsuits that stem from inappropriate and offensive e-mails circulating
within a company.
4. What are the five methods that employers can use to track employee
activities:
• Packet sniffers
• Log files
• Desktop monitoring programs
• Phones
• Closed-circuit cameras
5. What is a packet sniffer?
A packet sniffer is a program that can see all of the information passing over the
network it is connected to. As data streams back and forth on the network, the
program looks at, or "sniffs," each packet.
6. A packet sniffer located at one of the servers of your ISP would potentially be
able to monitor all of your online activities, such as:
• Which Web sites you visit
• What you look at on the site
• Whom you send e-mail to
• What's in the e-mail you send
• What you download from a site
Name: __________________ Date: ____________________
• What streaming events you use, such as audio, video and Internet telephony
Desktop Monitoring
7. Describe how a desktop monitoring system would monitor employees.
Desktop monitoring programs have the ability to record every keystroke. When you
are typing, a signal is sent from the keyboard to the application you are working in.
This signal can be intercepted and either streamed back to the person who installed
the monitoring program or recorded and sent back in a text file.
8. Explain how log files work?
A system administrator can determine what Web sites you've accessed, whom you
are sending e-mails to and receiving e-mails from and what applications are being
used.
9. Where can log files be found?
• Operating systems
• Web browsers (in the form of a cache)
• Applications (in the form of backups)
• E-mail
Traditional Eavesdropping
10.Describe how employers eavesdrop on their employees.
Employers eavesdrop on their employees by listening through phone calls or placing
a video camera in the employees work space.
11.Currently, 78 percent of all companies use some type of surveillance system.
Here is a breakdown of the methods they use:
• Storing and reviewing computer files: 36 percent
• Video-recording employees: 15 percent
• Recording and reviewing phone calls: 12 percent
• Storing and reviewing voice mail: 8 percent

Weitere ähnliche Inhalte

Ähnlich wie How workplace surveillance works katrina hunos

Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos Beretas
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities
OWASP
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Achievement summary during 2017 start with intro about IT depart.docx
Achievement  summary during 2017 start with intro about IT depart.docxAchievement  summary during 2017 start with intro about IT depart.docx
Achievement summary during 2017 start with intro about IT depart.docx
nettletondevon
 

Ähnlich wie How workplace surveillance works katrina hunos (20)

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
 
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
 
Test execution
Test executionTest execution
Test execution
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Network Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. ShivashankarNetwork Security_4th Module_Dr. Shivashankar
Network Security_4th Module_Dr. Shivashankar
 
Dynamic watermarking
Dynamic watermarkingDynamic watermarking
Dynamic watermarking
 
Achievement summary during 2017 start with intro about IT depart.docx
Achievement  summary during 2017 start with intro about IT depart.docxAchievement  summary during 2017 start with intro about IT depart.docx
Achievement summary during 2017 start with intro about IT depart.docx
 
Fingerprint Alert System A Solution for Effective Management System
Fingerprint Alert System A Solution for Effective Management SystemFingerprint Alert System A Solution for Effective Management System
Fingerprint Alert System A Solution for Effective Management System
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine Learning
 
Placement zone
Placement zonePlacement zone
Placement zone
 
Security testing
Security testingSecurity testing
Security testing
 
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
 

Kürzlich hochgeladen

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 

Kürzlich hochgeladen (18)

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 

How workplace surveillance works katrina hunos

  • 1. Name: __________________ Date: ____________________ How Workplace Surveillance Works Obtained on Sept. 13, 2007 from: http://computer.howstuffworks.com/workplace-surveillance.htm Introduction to How Workplace Surveillance Works 1. What activities are considered as cyberslacking according to the article? Activities considered as cyber slacking is sending personal e-mails, playing games, viewing pornography, shopping, checking stock prices and gambling online during working hours. 2. Do you think it is an ethical practice for an employer to track the websites that you may be going to at work? Explain why or why not. I do think that it is an ethical practice for an employer to track the websites because the employer needs to know which employee is being productive and using their time wisely. It isn’t fair to the employees that do their work properly and productively, while others go on sites they aren’t supposed to be on and they both get the same pay. A Growing Trend 3. Why do you think that employers are tracking the activities of their employees? Employers are also watching their workers to avoid sexual harassment and discrimination lawsuits that stem from inappropriate and offensive e-mails circulating within a company. 4. What are the five methods that employers can use to track employee activities: • Packet sniffers • Log files • Desktop monitoring programs • Phones • Closed-circuit cameras 5. What is a packet sniffer? A packet sniffer is a program that can see all of the information passing over the network it is connected to. As data streams back and forth on the network, the program looks at, or "sniffs," each packet. 6. A packet sniffer located at one of the servers of your ISP would potentially be able to monitor all of your online activities, such as: • Which Web sites you visit • What you look at on the site • Whom you send e-mail to • What's in the e-mail you send • What you download from a site
  • 2. Name: __________________ Date: ____________________ • What streaming events you use, such as audio, video and Internet telephony Desktop Monitoring 7. Describe how a desktop monitoring system would monitor employees. Desktop monitoring programs have the ability to record every keystroke. When you are typing, a signal is sent from the keyboard to the application you are working in. This signal can be intercepted and either streamed back to the person who installed the monitoring program or recorded and sent back in a text file. 8. Explain how log files work? A system administrator can determine what Web sites you've accessed, whom you are sending e-mails to and receiving e-mails from and what applications are being used. 9. Where can log files be found? • Operating systems • Web browsers (in the form of a cache) • Applications (in the form of backups) • E-mail Traditional Eavesdropping 10.Describe how employers eavesdrop on their employees. Employers eavesdrop on their employees by listening through phone calls or placing a video camera in the employees work space. 11.Currently, 78 percent of all companies use some type of surveillance system. Here is a breakdown of the methods they use: • Storing and reviewing computer files: 36 percent • Video-recording employees: 15 percent • Recording and reviewing phone calls: 12 percent • Storing and reviewing voice mail: 8 percent