LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Gannon-Leary, Pat (1997)
Publisher: Emerald
Languages: English
Types: Article
Subjects: P100
Identifiers:doi:10.1108/eb045560
In March 1996, American Libraries featured a piece about a librarian at the University of California/Irvine whose supervisor intercepted her e-mail while she was absent on medical leave. As a result of this, UC's Office for Academic Computing began a review of e-mail privacy on the nine-campus system. This article and UC's reaction prompted my research into this topic.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • KANNER, B. (1996) With e-mail replacing snail mail, privacy's a dilemma, Jackson Clarion-Ledger.
    • DANCA, R.A. (1993) Privacy Act would force firms to inform their employees about e-mail monitoring, PC Week, 18 June, 203-204.
    • FRYER, B. and R. FURGER (1993) Who's reading your screen? PC World, August, 166.
    • 'Librarian battles over e-mail privacy' (1996) American Libraries, March.
    • MARX, G. (1992) Let's eavesdrop on managers, Compute/world, 20 April, 29.
    • MILLER, M. (1995) Should e-mail be private? Los Angeles Times, 12 November, A3.
    • MOHAN, S. (1994) Users still wrestle with e-mail privacy: lack of clearly defined policies leave many wary, Computerworld, 28(50), 12 December, 24.
    • MORSE, A. (1995) University e-mail a test of Internet free speech, Los Angeles Times. 10 December, M2.
    • NARISETTI, R. (1996) E-mail snooping is OK in the eyes of the law, Wall Street Journal, 19 March, A1.
    • PEYSER, M. and S. RHODES (1995) When e-mail is oops-mail, Newsweek, 126(16), 16 October, 82.
    • SALAMONE, S. (1991) Attorney discusses how to avoid e-mail privacy woes, Network World, 25 March, 21.
    • SAMUELS, P.D. (1996) Who's reading your e-mail? maybe your boss. New York Times, 12 May, F11.
    • SKUPSKY. D.S. (1993) Establishing retention periods for electronic records, Records Management Quarterly, April.
    • STROM, D. (1994) Who owns your e-mail messages? 'Netiquette' for business, InfoWorld, 16(20), 16 May, 45.
    • THOMPSON, J.A., K.B. DeTIENNE and K.L. SMART (1995) Privacy, e-mail and information policy: where ethics meets reality, IEEE Transactions on Professional Communication, 38(3), 158-164.
    • ULRICH, W. (1990) Rights of privacy in e-mail, Los Angeles Times, 7 September, D3.
    • WEIGNER, K. (1992) The trouble with e-mail, Working Women, April, 46.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article