Watching the watchers: "voluntary monitoring" of infosec employees

Purpose – While many papers discuss the privacy implications of workplace monitoring, the purpose of this paper is to describe the positive aspects to voluntary monitoring in the workplace.Design/methodology/approach – These aspects were identified through in‐depth qualitative interviews with employees of various organizations chosen for the invasiveness of their monitoring procedures. Specifically, the authors worked with individuals who had high‐level government clearances, working in information security (infosec), who were subjected to comprehensive monitoring both before being employed and during the term of their employment.Findings – Through these interviews, the paper identifies four positive results of employee monitoring, four procedural issues that affected employee perception of the monitoring, and two secondary aspects that are specific benefits of holding a clearance, as opposed to benefits from the monitoring itself.Research limitations/implications – The research reported here is gathered ...

[1]  M. Myers Qualitative Research and the Generalizability Question: Standing Firm with Proteus , 2000 .

[2]  J. Trenor,et al.  First generation college students in engineering: A qualitative investigation of barriers to academic plans , 2008, 2008 38th Annual Frontiers in Education Conference.

[3]  Scott Carter The role of the author in topical blogs , 2005, CHI EA '05.

[4]  Wayne G. Lutters,et al.  Midweight collaborative remembering: wikis in the workplace , 2007, CHIMIT '07.

[5]  James Bamford,et al.  Body of secrets : anatomy of the ultra-secret National Security Agency : from the Cold War through the dawn of a new century , 2001 .

[6]  John Weckert Trust and monitoring in the workplace , 2000, University as a Bridge from Technology to Society. IEEE International Symposium on Technology and Society (Cat. No.00CH37043).

[7]  John Weckert,et al.  Privacy, the Workplace and the Internet , 1999, WebNet.

[8]  Jeretta Horn Nord,et al.  E-monitoring in the workplace: privacy, legislation, and surveillance software , 2006, CACM.

[9]  J. Barlow,et al.  Implementing complex innovations in fluid multi-stakeholder environments: Experiences of ‘telecare’ , 2006 .

[10]  Tara Whalen,et al.  Watchdog or Guardian? Unpacking the Issues Surrounding the Monitoring of InfoSec Employees , 2009, HAISA.

[11]  Minhua Ma,et al.  Serious games for movement therapy after stroke , 2008, 2008 IEEE International Conference on Systems, Man and Cybernetics.

[12]  Carole L. Palmer,et al.  Comparing bioinformatics software development by computer scientists and biologists: An exploratory study , 2009, 2009 ICSE Workshop on Software Engineering for Computational Science and Engineering.

[13]  Joy L. Hart,et al.  Workplace Surveillance and Managing Privacy Boundaries , 2007 .

[14]  P.E. Ross Managing care through the air [remote health monitoring] , 2004, IEEE Spectrum.

[15]  C. Stoll The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .

[16]  Joseph H. Goldberg,et al.  Eye tracking in web search tasks: design implications , 2002, ETRA.