WADT 2016: Recent Trends in Algebraic Development Techniques pp 13-35 | Cite as
Theorising Monitoring: Algebraic Models of Web Monitoring in Organisations
Abstract
Our lives are facilitated and mediated by software. Thanks to software, data on nearly everything can be generated, accessed and analysed for all sorts of reasons. Software technologies, combined with political and commercial ideas and practices, have led to a wide range of our activities being monitored, which is the source of concerns about surveillance and privacy. We pose the questions: What is monitoring? Do diverse and disparate monitoring systems have anything in common? What role does monitoring play in contested issues of surveillance and privacy? We are developing an abstract theory for studying monitoring that begins by capturing structures common to many different monitoring practices. The theory formalises the idea that monitoring is a process that observes the behaviour of people and objects in a context. Such entities and their behaviours can be represented by abstract data types and their observable attributes by logics. In this paper, we give a formal model of monitoring based on the idea that behaviour is modelled by streams of data, and apply the model to a social context: the monitoring of web usage by staff and members of an organisation.
Keywords
Context Monitoring Records Interventions Surveillance Organisation Employee monitoring Web monitoring Abstract data types Algebraic specification StreamsNotes
Acknowledgments
These ideas were first presented publicly by one of us (JVT) at Gregynog in an invited lecture at WADT16; we thank the organisers for the invitation and colleagues attending WADT 16 for their encouraging and helpful comments. This work was partially supported by the EPSRC project Data Release - Trust, Identity, Privacy and Security (EP/N028139/1 and EP/N027825/1).
References
- 1.Angles, R.: A comparison of current graph database models. In: IEEE 28th International Conference on Data Engineering Workshops (ICDEW), pp. 171–177. IEEE (2012)Google Scholar
- 2.The National Association of Citizens Advice Bureaux: Monitoring at work (2016). www.citizensadvice.org.uk/work/rights-at-work/basic-rights-and-contracts/monitoring-at-work
- 3.Ford, M.: Surveillance and privacy at work (1998). www.ier.org.uk/publications/surveillance-and-privacy-work
- 4.Johnson, K., Tucker, J.V., Wang, V.: Monitoring and intervention: concepts and formal models. arXiv:1701.07484 (2016). https://arxiv.org/abs/1701.07484
- 5.Korth, H.F., Sudarshan, S., Silberschatz, A.: Database System Concepts. McGraw-Hill, New York City (2010)MATHGoogle Scholar
- 6.Lyon, D.: Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. Routledge, Abingdon (2003)Google Scholar
- 7.Lyon, D.: Surveillance Studies: An Overview. Polity Press, Cambridge (2007)Google Scholar
- 8.Mishra, J., Crampton, S.: Employee monitoring: privacy in the workplace? SAM Adv. Manag. J. 63(3), 4–11 (1998)Google Scholar
- 9.O’Donnell, A.T., Ryan, M.K., Jetten, J.: The hidden costs of surveillance for performance and helping behaviour. Group Process. Intergroup Relat. 16, 246–256 (2012)CrossRefGoogle Scholar
- 10.Paganini, P.: Employee monitoring, a controversial topic (2016). http://securityaffairs.co/wordpress/46814/digital-id/employee-monitoring.html
- 11.Stoltenberg-Hansen, V., Tucker, J.V.: Effective algebras. In: Abramsky, S., Gabbay, D., Maibaum, T. (eds.) Handbook of Logic in Computer Science. Volume IV: Semantic Modelling, pp. 357–526. Oxford University Press (1995)Google Scholar
- 12.Tavani, H.: Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Wiley, Hoboken (2010)Google Scholar
- 13.TechTarget: comprehensive guide to desktop monitoring tools. http://searchenterprisedesktop.techtarget.com/essentialguide/Comprehensive-guide-to-desktop-monitoring-tools
- 14.Tucker, J.V., Zucker, J.I.: Computable functions and semicomputable sets on many sorted algebras. In: Abramsky, S., Gabbay, D., Maibaum, T. (eds.) Handbook of Logic in Computer Science. Volume V: Logical and Algebraic Methods. Oxford University Press (2000)Google Scholar
- 15.Tucker, J.V., Zucker, J.I.: Continuity of operators on continuous and discrete time streams. Theor. Comput. Sci. 412, 3378–3403 (2011)MathSciNetCrossRefMATHGoogle Scholar
- 16.Tucker, J.V., Zucker, J.I.: Computability of operators on continuous and discrete time streams. Computability 3, 9–44 (2014)MathSciNetMATHGoogle Scholar
- 17.Tucker, J.V., Zucker, J.I.: Generalizing computability to abstract algebra. In: Sommaruga, G., Strahm, T. (eds.) Turing’s Revolution: The Impact of His Ideas About Computability. Birkhäuser, Springer Basel (2015)Google Scholar
- 18.Yerby, J.: Legal and ethical issues of employee monitoring. Online J. Appl. Knowl. Manag. 1(2), 44–55 (2013)Google Scholar