Theorising Monitoring: Algebraic Models of Web Monitoring in Organisations

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10644)

Abstract

Our lives are facilitated and mediated by software. Thanks to software, data on nearly everything can be generated, accessed and analysed for all sorts of reasons. Software technologies, combined with political and commercial ideas and practices, have led to a wide range of our activities being monitored, which is the source of concerns about surveillance and privacy. We pose the questions: What is monitoring? Do diverse and disparate monitoring systems have anything in common? What role does monitoring play in contested issues of surveillance and privacy? We are developing an abstract theory for studying monitoring that begins by capturing structures common to many different monitoring practices. The theory formalises the idea that monitoring is a process that observes the behaviour of people and objects in a context. Such entities and their behaviours can be represented by abstract data types and their observable attributes by logics. In this paper, we give a formal model of monitoring based on the idea that behaviour is modelled by streams of data, and apply the model to a social context: the monitoring of web usage by staff and members of an organisation.

Keywords

Context Monitoring Records Interventions Surveillance Organisation Employee monitoring Web monitoring Abstract data types Algebraic specification Streams 

Notes

Acknowledgments

These ideas were first presented publicly by one of us (JVT) at Gregynog in an invited lecture at WADT16; we thank the organisers for the invitation and colleagues attending WADT 16 for their encouraging and helpful comments. This work was partially supported by the EPSRC project Data Release - Trust, Identity, Privacy and Security (EP/N028139/1 and EP/N027825/1).

References

  1. 1.
    Angles, R.: A comparison of current graph database models. In: IEEE 28th International Conference on Data Engineering Workshops (ICDEW), pp. 171–177. IEEE (2012)Google Scholar
  2. 2.
    The National Association of Citizens Advice Bureaux: Monitoring at work (2016). www.citizensadvice.org.uk/work/rights-at-work/basic-rights-and-contracts/monitoring-at-work
  3. 3.
    Ford, M.: Surveillance and privacy at work (1998). www.ier.org.uk/publications/surveillance-and-privacy-work
  4. 4.
    Johnson, K., Tucker, J.V., Wang, V.: Monitoring and intervention: concepts and formal models. arXiv:1701.07484 (2016). https://arxiv.org/abs/1701.07484
  5. 5.
    Korth, H.F., Sudarshan, S., Silberschatz, A.: Database System Concepts. McGraw-Hill, New York City (2010)MATHGoogle Scholar
  6. 6.
    Lyon, D.: Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. Routledge, Abingdon (2003)Google Scholar
  7. 7.
    Lyon, D.: Surveillance Studies: An Overview. Polity Press, Cambridge (2007)Google Scholar
  8. 8.
    Mishra, J., Crampton, S.: Employee monitoring: privacy in the workplace? SAM Adv. Manag. J. 63(3), 4–11 (1998)Google Scholar
  9. 9.
    O’Donnell, A.T., Ryan, M.K., Jetten, J.: The hidden costs of surveillance for performance and helping behaviour. Group Process. Intergroup Relat. 16, 246–256 (2012)CrossRefGoogle Scholar
  10. 10.
    Paganini, P.: Employee monitoring, a controversial topic (2016). http://securityaffairs.co/wordpress/46814/digital-id/employee-monitoring.html
  11. 11.
    Stoltenberg-Hansen, V., Tucker, J.V.: Effective algebras. In: Abramsky, S., Gabbay, D., Maibaum, T. (eds.) Handbook of Logic in Computer Science. Volume IV: Semantic Modelling, pp. 357–526. Oxford University Press (1995)Google Scholar
  12. 12.
    Tavani, H.: Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Wiley, Hoboken (2010)Google Scholar
  13. 13.
  14. 14.
    Tucker, J.V., Zucker, J.I.: Computable functions and semicomputable sets on many sorted algebras. In: Abramsky, S., Gabbay, D., Maibaum, T. (eds.) Handbook of Logic in Computer Science. Volume V: Logical and Algebraic Methods. Oxford University Press (2000)Google Scholar
  15. 15.
    Tucker, J.V., Zucker, J.I.: Continuity of operators on continuous and discrete time streams. Theor. Comput. Sci. 412, 3378–3403 (2011)MathSciNetCrossRefMATHGoogle Scholar
  16. 16.
    Tucker, J.V., Zucker, J.I.: Computability of operators on continuous and discrete time streams. Computability 3, 9–44 (2014)MathSciNetMATHGoogle Scholar
  17. 17.
    Tucker, J.V., Zucker, J.I.: Generalizing computability to abstract algebra. In: Sommaruga, G., Strahm, T. (eds.) Turing’s Revolution: The Impact of His Ideas About Computability. Birkhäuser, Springer Basel (2015)Google Scholar
  18. 18.
    Yerby, J.: Legal and ethical issues of employee monitoring. Online J. Appl. Knowl. Manag. 1(2), 44–55 (2013)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2017

Authors and Affiliations

  • Kenneth Johnson
    • 1
  • John V. Tucker
    • 2
  • Victoria Wang
    • 3
  1. 1.School of Engineering, Computer and Mathematical SciencesAuckland University of TechnologyAucklandNew Zealand
  2. 2.Department of Computer ScienceSwansea UniversitySwanseaUK
  3. 3.Institute of Criminal Justice StudiesUniversity of PortsmouthPortsmouthUK

Personalised recommendations