These are the sources and citations used to research Computing in Contemporary Society. This bibliography was generated on Cite This For Me on
In-text: (Deffenbaugh, 2021)
Your Bibliography: Deffenbaugh, R., 2021. More spying on remote workers draws lawmaker ire: As the use of workplace monitoring software climbs, momentum builds in Albany to curb companies' control. Trade Journal, [online] 37(44). Available at: <https://www-proquest-com.napier.idm.oclc.org/docview/2608169159/citation/355CF24B4E4E437FPQ/1?accountid=16607> [Accessed 9 April 2022].
In-text: (Hensel and Kacprzak, 2020)
Your Bibliography: Hensel, P. and Kacprzak, A., 2020. Job Overload, Organizational Commitment, and Motivation as Antecedents of Cyberloafing: Evidence from Employee Monitoring Software. European Management Review, 17(4), pp.931-942.
In-text: (Jiang, Tsohou, Siponen and Li, 2020)
Your Bibliography: Jiang, H., Tsohou, A., Siponen, M. and Li, Y., 2020. Examining the side effects of organizational Internet monitoring on employees. Internet Research, 30(6), pp.1613-1630.
In-text: (Sipior, 2021)
Your Bibliography: Sipior, J., 2021. Monitoring Remote Employees at FinPro. Communications of the Association for Information Systems, 49(1), pp.304-320.
In-text: (Integrating Employee Monitoring Software into Your Cybersecurity Model | SoftActivity, 2020)
Your Bibliography: SoftActivity. 2020. Integrating Employee Monitoring Software into Your Cybersecurity Model | SoftActivity. [online] Available at: <https://www.softactivity.com/ideas/integrating-employee-monitoring-software-into-your-cybersecurity-model/> [Accessed 9 April 2022].
In-text: (Steyer, 2021)
Your Bibliography: Steyer, R., 2021. Industry facing higher bills for cyber insurance: Increased attacks have led to tougher underwriting, making policies more costly. Trade Journal, [online] 49(24), p.2. Available at: <https://login.napier.idm.oclc.org/login?qurl=https%3A%2F%2Fwww.proquest.com%2Ftrade-journals%2Findustry-facing-higher-bills-cyber-insurance%2Fdocview%2F2605306578%2Fse-2%3Faccountid%3D16607> [Accessed 9 April 2022].
In-text: (Yoost, 2020)
Your Bibliography: Yoost, D., 2020. Ensuring Data Privacy and Security. RMA Journal, 102(5), pp.16-20.
10,587 students joined last month!