Openly accessible

Monitoring employees emails without violating their privacy right

Antoniou, Giannakis, Parampalli, Udaya and Batten, Lynn 2007, Monitoring employees emails without violating their privacy right, in PDCAT 2007 : Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies : 3-6 December, 2007, Adelaide, Australia, Institute of Electrical and Electronics Engineers (IEEE), Los Alamitos, Calif., pp. 46-50.

Attached Files
Name Description MIMEType Size Downloads
batten-monitoringemployeesemails-2007.pdf Published version application/pdf 329.24KB 170

Title Monitoring employees emails without violating their privacy right
Author(s) Antoniou, Giannakis
Parampalli, Udaya
Batten, Lynn
Conference name International Conference on Parallel and Distributed Computing, Applications and Technologies (8th : 2007 : Adelaide, Australia)
Conference location Adelaide, Australia
Conference dates 3-6 December 2007
Title of proceedings PDCAT 2007 : Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies : 3-6 December, 2007, Adelaide, Australia
Editor(s) Munro, David S.
Shen, Hong
Sheng, Quan Z.
Detmold, Henry
Falkner, Katrina E.
Izu, Cruz
Coddington, Paul D.
Bradley, Alexander
Zheng, Si-Qing
Publication date 2007
Conference series Parallel and Distributed Computing Applications and Technologies Conference
Start page 46
End page 50
Publisher Institute of Electrical and Electronics Engineers (IEEE)
Place of publication Los Alamitos, Calif.
Summary The capability of an employee to violate the policy of an organization is a concern for an employer. Monitoring is a measure taken by an employer to discourage an employee from acting inappropriately. However, current monitoring techniques tend to raise privacy issues because they violate the privacy rights of employees. Applying a monitoring technique without violating the privacy of employees is the aim of this paper. We propose a design and a protocol which give an employer the opportunity to monitor employee email in order to detect company policy violations. This can be achieved without violating the privacy of honest employees, while at the same time revealing evidence about the illegal actions of dishonest employees.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 0769530494
9780769530499
Language eng
Field of Research 080609 Information Systems Management
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2007 IEEE.
Persistent URL http://hdl.handle.net/10536/DRO/DU:30008149

Document type: Conference Paper
Collections: School of Engineering and Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Google Scholar Search Google Scholar
Access Statistics: 427 Abstract Views, 170 File Downloads  -  Detailed Statistics
Created: Mon, 29 Sep 2008, 09:05:08 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.