Skip to main content

Theorising Monitoring: Algebraic Models of Web Monitoring in Organisations

  • Conference paper
  • First Online:
  • 369 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10644))

Abstract

Our lives are facilitated and mediated by software. Thanks to software, data on nearly everything can be generated, accessed and analysed for all sorts of reasons. Software technologies, combined with political and commercial ideas and practices, have led to a wide range of our activities being monitored, which is the source of concerns about surveillance and privacy. We pose the questions: What is monitoring? Do diverse and disparate monitoring systems have anything in common? What role does monitoring play in contested issues of surveillance and privacy? We are developing an abstract theory for studying monitoring that begins by capturing structures common to many different monitoring practices. The theory formalises the idea that monitoring is a process that observes the behaviour of people and objects in a context. Such entities and their behaviours can be represented by abstract data types and their observable attributes by logics. In this paper, we give a formal model of monitoring based on the idea that behaviour is modelled by streams of data, and apply the model to a social context: the monitoring of web usage by staff and members of an organisation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://www.torproject.org.

  2. 2.

    URLs are definable by a context free grammar.

References

  1. Angles, R.: A comparison of current graph database models. In: IEEE 28th International Conference on Data Engineering Workshops (ICDEW), pp. 171–177. IEEE (2012)

    Google Scholar 

  2. The National Association of Citizens Advice Bureaux: Monitoring at work (2016). www.citizensadvice.org.uk/work/rights-at-work/basic-rights-and-contracts/monitoring-at-work

  3. Ford, M.: Surveillance and privacy at work (1998). www.ier.org.uk/publications/surveillance-and-privacy-work

  4. Johnson, K., Tucker, J.V., Wang, V.: Monitoring and intervention: concepts and formal models. arXiv:1701.07484 (2016). https://arxiv.org/abs/1701.07484

  5. Korth, H.F., Sudarshan, S., Silberschatz, A.: Database System Concepts. McGraw-Hill, New York City (2010)

    MATH  Google Scholar 

  6. Lyon, D.: Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. Routledge, Abingdon (2003)

    Google Scholar 

  7. Lyon, D.: Surveillance Studies: An Overview. Polity Press, Cambridge (2007)

    Google Scholar 

  8. Mishra, J., Crampton, S.: Employee monitoring: privacy in the workplace? SAM Adv. Manag. J. 63(3), 4–11 (1998)

    Google Scholar 

  9. O’Donnell, A.T., Ryan, M.K., Jetten, J.: The hidden costs of surveillance for performance and helping behaviour. Group Process. Intergroup Relat. 16, 246–256 (2012)

    Article  Google Scholar 

  10. Paganini, P.: Employee monitoring, a controversial topic (2016). http://securityaffairs.co/wordpress/46814/digital-id/employee-monitoring.html

  11. Stoltenberg-Hansen, V., Tucker, J.V.: Effective algebras. In: Abramsky, S., Gabbay, D., Maibaum, T. (eds.) Handbook of Logic in Computer Science. Volume IV: Semantic Modelling, pp. 357–526. Oxford University Press (1995)

    Google Scholar 

  12. Tavani, H.: Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Wiley, Hoboken (2010)

    Google Scholar 

  13. TechTarget: comprehensive guide to desktop monitoring tools. http://searchenterprisedesktop.techtarget.com/essentialguide/Comprehensive-guide-to-desktop-monitoring-tools

  14. Tucker, J.V., Zucker, J.I.: Computable functions and semicomputable sets on many sorted algebras. In: Abramsky, S., Gabbay, D., Maibaum, T. (eds.) Handbook of Logic in Computer Science. Volume V: Logical and Algebraic Methods. Oxford University Press (2000)

    Google Scholar 

  15. Tucker, J.V., Zucker, J.I.: Continuity of operators on continuous and discrete time streams. Theor. Comput. Sci. 412, 3378–3403 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  16. Tucker, J.V., Zucker, J.I.: Computability of operators on continuous and discrete time streams. Computability 3, 9–44 (2014)

    MathSciNet  MATH  Google Scholar 

  17. Tucker, J.V., Zucker, J.I.: Generalizing computability to abstract algebra. In: Sommaruga, G., Strahm, T. (eds.) Turing’s Revolution: The Impact of His Ideas About Computability. Birkhäuser, Springer Basel (2015)

    Google Scholar 

  18. Yerby, J.: Legal and ethical issues of employee monitoring. Online J. Appl. Knowl. Manag. 1(2), 44–55 (2013)

    Google Scholar 

Download references

Acknowledgments

These ideas were first presented publicly by one of us (JVT) at Gregynog in an invited lecture at WADT16; we thank the organisers for the invitation and colleagues attending WADT 16 for their encouraging and helpful comments. This work was partially supported by the EPSRC project Data Release - Trust, Identity, Privacy and Security (EP/N028139/1 and EP/N027825/1).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John V. Tucker .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Johnson, K., Tucker, J.V., Wang, V. (2017). Theorising Monitoring: Algebraic Models of Web Monitoring in Organisations. In: James, P., Roggenbach, M. (eds) Recent Trends in Algebraic Development Techniques. WADT 2016. Lecture Notes in Computer Science(), vol 10644. Springer, Cham. https://doi.org/10.1007/978-3-319-72044-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72044-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72043-2

  • Online ISBN: 978-3-319-72044-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics