Bosses with x-ray eyes

Piller, Charles
July 1993
Macworld;Jul1993, Vol. 10 Issue 7, p118
Focuses on the use of computer technology in monitoring of employees. Reasons; Possible negative effects; Possible legislative relief. INSETS: Job seeker beware: Electronic hurdles to employment.;A model employment-privacy policy.;To catch a spy: Is workplace E-mail private?;Electronic eavesdropping at work.


Related Articles

  • All about eavesdropping. Fitzgerald, Patrick // New Statesman & Society;7/29/94, Vol. 7 Issue 313, p30 

    Discusses how digital exchanges make phone tapping easier for the British security services. Direct relay of intercepted communications to agencies; Tapping into digital private branch exchanges; Interception of international communications by the GCHQ through radio and cable channels.

  • The spy who bugged me. Fox, Barry // New Scientist;03/11/2000, Vol. 165 Issue 2229, p15 

    Reports the publication of patents filed by Motorola in the United States and Europe involving satellite phone calls via satellite links and the possibility of eavesdropping. Description of the linking processes involved in a satellite phone system; Problems concerning the ease of eavesdropping;...

  • Patents. Fox, Barry // New Scientist;06/12/99, Vol. 162 Issue 2190, p7 

    Offers scientific news briefs as of June 12, 1999. Invention created by Bahman Litkouhi and Robert Abplanalp to help people who choke on their food; How the Japanese company Kyoyu of Tokyo is patenting a system that lets you eavesdrop with the vibrations of a window caused by speech; How to...

  • Eye can see you. Jenkins, J. // New Statesman & Society;2/21/92, Vol. 5 Issue 190, p14 

    Explores the exponential growth in the past decade of low-level, high-tech surveillance. Examples of indirect automatic surveillance, such as computerized bus ticket sales and automatic cash-point machines; Rise of systems designed specifically to track people's movements; Implications for...

  • Bugging. Freeman, J.; Freundlich, N. // Popular Science;Aug87, Vol. 231 Issue 2, p44 

    An amazing arsenal of devices is used in the sinister business of electronic eavesdropping. A look at these diminutive bugs and the prodigious technology on which they are based, and how they're used in the espionage war between the US and the Soviet Union.

  • Surreptitious recording of suspects' conversations. Crawford, Kimberly A. // FBI Law Enforcement Bulletin;Sep93, Vol. 62 Issue 9, p26 

    Discusses the legality of the surreptitious recording of suspects' conversations through listening devices or undercover work. Compliance with the fourth amendment of the United States Constitution; Fifth amendment; Sixth amendment; Compliance with Title III of the Omnibus Crime Control and...

  • Wiretaps.  // Newsweek;11/4/1985, Vol. 106 Issue 19, p66 

    In 1968, Congress set out rules for electronic surveillance in a complex statute that balanced the needs of law enforcement with the Fourth Amendment protection against unreasonable searches. But the lawmakers didn't foresee how quickly Americans would embrace such devices as electronic mail and...

  • What eavesdroppers know (and you should learn). Kaufman, Margo // Redbook;May95, Vol. 185 Issue 1, p62 

    Presents a guide to eavesdropping. Benefits; Drawbacks; Distinction from spying; How eavesdropping enhances or harms; Electronic eavesdropping; Doing it at home. INSET: How to eavesdrop like a pro, by Betty Wong..

  • Privacy in peril. Piller, Charles // Macworld;Jul1993, Vol. 10 Issue 7, p124 

    Discusses how computers are making access to personal information easier. Obsolete and incorrect information; Conflicting values; Personal data as commodity; Data-reselling trade; Question of priorities; Credit records; Conflict between access and privacy; Management of electronic privacy; Role...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics