enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Corporate surveillance - Wikipedia

    en.wikipedia.org/wiki/Corporate_surveillance

    In 1993, David Steingard and Dale Fitzgibbons argued that modern management, far from empowering workers, had features of neo-Taylorism, where teamwork perpetuated surveillance and control. They argued that employees had become their own " thought police " and the team gaze was the equivalent of Bentham's panopticon guard tower. [ 18 ]

  3. Physical security - Wikipedia

    en.wikipedia.org/wiki/Physical_security

    Modern prisons are among some of the most physically secure facilities, with almost every area under tight access control and surveillance. Pictured here is the exterior of Shata Prison in Israel, which is secured through the use of high fences, razor wire, protective barriers, guard towers, and security lighting.

  4. Control room - Wikipedia

    en.wikipedia.org/wiki/Control_room

    Some control rooms are themselves under continuous video surveillance and recording, for security and personnel accountability purposes. Many control rooms are occupied on a " 24/7/365 " basis, and may have multiple people on duty at all times (such as implementation of a " two-man rule "), to ensure continuous vigilance.

  5. Employee monitoring - Wikipedia

    en.wikipedia.org/wiki/Employee_monitoring

    Employee monitoring is the (often automated) surveillance of workers' activity. Organizations engage in employee monitoring for different reasons such as to track performance, to avoid legal liability, to protect trade secrets, and to address other security concerns. [1]

  6. Computer surveillance in the workplace - Wikipedia

    en.wikipedia.org/wiki/Computer_surveillance_in...

    Computer surveillance in the workplace is the use of computers to monitor activity in a workplace. Computer monitoring is a method of collecting performance data which employers obtain through digitalised employee monitoring. Computer surveillance may nowadays be used alongside traditional security applications, such as closed-circuit ...

  7. Surveillance - Wikipedia

    en.wikipedia.org/wiki/Surveillance

    The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. [9] In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies.

  8. US Senate votes to reauthorize surveillance program ... - AOL

    www.aol.com/news/us-senate-votes-reauthorize...

    WASHINGTON (Reuters) -The U.S. Senate voted late on Friday night to approve the reauthorization of a controversial surveillance program, narrowly missing the midnight expiration of the program ...

  9. Workplace health surveillance - Wikipedia

    en.wikipedia.org/wiki/Workplace_Health_Surveillance

    Hazard surveillance is an essential component of any occupational health surveillance effort and is used for defining the elements of the risk management program. Critical elements of a risk management program include recognizing potential exposures and taking appropriate actions to minimize them (for example, implementing engineering controls ...