WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/794006591

9 to 5 do you know if your boss knows where you are?

Describes a case study of six enterprises that use Radio Frequence Identification (RFID) tags to control access in the workplace to understand their policies about personally identifiable records obtained by sensing RFID-based access cards. These policies have a number of common features, but the policies are neither documented nor shared with employees. While employees ought to be informed about uses of access control system records, implementing traditional fair information practices for such records would be impractical in some situations.

Open All Close All

http://schema.org/about

http://schema.org/alternateName

  • "Nine to five"@en
  • "Nine to five"
  • "Radio frequency identification usage in the workplace"@en
  • "Radio frequency identification usage in the workplace"

http://schema.org/description

  • "Describes a case study of six enterprises that use Radio Frequence Identification (RFID) tags to control access in the workplace to understand their policies about personally identifiable records obtained by sensing RFID-based access cards. These policies have a number of common features, but the policies are neither documented nor shared with employees. While employees ought to be informed about uses of access control system records, implementing traditional fair information practices for such records would be impractical in some situations."
  • "Describes a case study of six enterprises that use Radio Frequence Identification (RFID) tags to control access in the workplace to understand their policies about personally identifiable records obtained by sensing RFID-based access cards. These policies have a number of common features, but the policies are neither documented nor shared with employees. While employees ought to be informed about uses of access control system records, implementing traditional fair information practices for such records would be impractical in some situations."@en
  • "Describes a case study of six enterprises that use Radio Frequency Identification (RFID) tags to control access in the workplace to understand their policies about personally identifiable records obtained by sensing RFID-based access cards. These policies have a number of common features, but the policies are neither documented nor shared with employees."@en
  • "Radio Frequency Identification (RFID) tags are finding their way into a broad range of new applications that have raised concerns about privacy that demonstrate how emerging information technologies can upset the balance of privacy, personal benefits, and public safety and security. Although proposed retail uses are new, RFID tags have been used to control access in the workplace for over a decade. The authors conducted a case study of six enterprises to understand their policies for collecting, retaining, and using personally identifiable records obtained by sensing RFID-based access cards. They found that RFID usage in the surveyed workplaces has a number of common features (data are used for more than access control, access control system records are linked with other enterprise databases, and security and employment practices trump privacy concerns), but that policies are not generally written down or communicated to employees. They conclude that although employees ought to be informed about uses of access control system records and have the right to inspect and correct records about their activities, implementing traditional fair information practices for access control systems records would be impractical for some situations, such as the individualâ‚‚s ability to correct an erroneous record. Thus there is a need for a modified notion of fair information practices with regard to this use of RFID technology."
  • "New information technologies have created unprecedented opportunities to collect, store, and transfer information. Technology can be applied to make our lives both easier and safer, but it can also diminish our privacy and civil liberties. Effective decision making about relationships among personal convenience, public safety, security, and privacy requires many kinds of knowledge. Together with Carnegie Mellon University, we outlined an empirical approach to generating such knowledge (Balkovich et al., 2004). As a starting point, RAND examined a commonly used information technology-Radio Frequency Identification (RFID) tags in access cards. Access cards are often used in the workplace to control entry to facilities. Data describing a card's use by an individual employee can be collected by an access control system and analyzed. This common deployment of RFID technology should require policies to balance the concerns of personal convenience, security, and privacy when access cards are used. This report examines such contemporary workplace policies."@en
  • "Radio Frequency Identification (RFID) tags are finding their way into a broad range of new applications that have raised concerns about privacy that demonstrate how emerging information technologies can upset the balance of privacy, personal benefits, and public safety and security. Although proposed retail uses are new, RFID tags have been used to control access in the workplace for over a decade. The authors conducted a case study of six enterprises to understand their policies for collecting, retaining, and using personally identifiable records obtained by sensing RFID-based access cards. They found that RFID usage in the surveyed workplaces has a number of common features (data are used for more than access control, access control system records are linked with other enterprise databases, and security and employment practices trump privacy concerns), but that policies are not generally written down or communicated to employees. They conclude that although employees ought to be informed about uses of access control system records and have the right to inspect and correct records about their activities, implementing traditional fair information practices for access control systems records would be impractical for some situations, such as the individual's ability to correct an erroneous record. Thus there is a need for a modified notion of fair information practices with regard to this use of RFID technology."@en

http://schema.org/genre

  • "Livres électroniques"
  • "Guidebooks"@en
  • "Guidebooks"
  • "Electronic books"@en

http://schema.org/name

  • "9 to 5 do you know if your boss knows where you are?"@en
  • "9 to 5 : do you know if your boss knows where you are? : case studies of radio frequency identification usage in the workplace"
  • "9 to 5 do you know if your boss knows where you are? : case studies of radio frequency identification usage in the workplace"
  • "9 to 5 do you know if your boss knows where you are? : case studies of radio frequency identification usage in the workplace"@en
  • "9 to 5 : do you know if your boss knows where you are? Case studies of Radio Frequency Identification usage in the workplace"
  • "9 to 5: do you know if your boss knows where you are? : Case studies of radio frequency identification usage in the workplace"
  • "9 TO 5: Do You Know If Your Boss Knows Where You Are? Case Studies of Radio Frequency Identification Usage in the Workplace"@en