Privacy Policy, Training and Adaption of Employee Monitoring Technology to Curtail Workplace Harassment in Organizations: An Application of TAM

Author(s):  
Zahidah Ismail ◽  
Shahid Anjum
2020 ◽  
Vol 18 (4) ◽  
pp. 540-554
Author(s):  
Ivan Manokha

Jeremy Bentham’s panopticon prison project was based on three central assumptions: the omnipresence of the “watcher”; the universal visibility of objects of surveillance; and the assumption, by the “watched,” that they are under constant observation. While the metaphor of the panopticon, following Michel Foucault’s work, was often applied to workplace and workplace surveillance to highlight the “disciplining” power of the supervisor’s “gaze,” this paper argues that it is only with the recent advent of digital employee monitoring technology that the workplace is becoming truly “panoptic.” With modern electronic means of surveillance, the supervisor is always “looking”—even when not physically present or not actually watching employees—as all worker actions and movements may now be recorded and analyzed (in real time or at any time in the future). This paper argues that the modern workplace approximates Bentham’s panoptic prison much more than the “traditional” workplace ever did and examines the implications of this fundamental historical change in the paradigm of employee monitoring for power relations in the modern workplace.


2010 ◽  
Author(s):  
Henry DeYoung ◽  
Deepak Garg ◽  
Limin Jia ◽  
Dilsun Kaynar ◽  
Anupam Datta

Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.


2019 ◽  
Vol 102 (4) ◽  
pp. 413-418 ◽  
Author(s):  
C. Tarantini ◽  
P. Brouqui ◽  
R. Wilson ◽  
K. Griffiths ◽  
P. Patouraux ◽  
...  

2014 ◽  
Vol 575 ◽  
pp. 805-808
Author(s):  
Jin Hong Zhu ◽  
Ze Guo Wei

In this paper, remote monitoring technology and its application to control of industrial power supply are discussed in detail, including its composition, function and classification. The two approaches of wired and wireless communication are analyzed, and four cases of typical systems are introduced as well. Practice has proved that the presented several control schemes are feasible and effective.


Sign in / Sign up

Export Citation Format

Share Document