tag:blogger.com,1999:blog-28080901.post3884009546573091429..comments2024-03-20T08:37:50.011+00:00Comments on Bullying of Academics in Higher Education: Interception and Monitoring of Communications in FE and HEUnknownnoreply@blogger.comBlogger2125tag:blogger.com,1999:blog-28080901.post-8918655623103887542006-12-17T11:31:00.000+00:002006-12-17T11:31:00.000+00:00Indeed. Monitoring can be used for various reasons...Indeed. Monitoring can be used for various reasons beyond the so called 'legitimate' reasons. Those that hold the keys are never really accountable. They are a law upon themselves.<br /><br />I remember a trick I played to one of our IT persons who I knew was monitoring my email. I wrote in an email something implicating him - I had the evidence - and when he read my email he got so scared, he went and confessed by himself!<br /><br />I also know of staff who never use the university's network and use only their own email to communicate, thus by-passing the controlled network.<br /><br />Regarding supervisors monitoring staff emails to take their ideas from them, why is it that nothing surprises me?Pierre-Joseph Proudhonhttps://www.blogger.com/profile/04513749066985128661noreply@blogger.comtag:blogger.com,1999:blog-28080901.post-79420940569167148492006-12-17T09:45:00.000+00:002006-12-17T09:45:00.000+00:00Communications monitoring, bring in communism
Com...Communications monitoring, bring in communism<br /><br />Communications Monitoring conflicts with true scholarship and should be banned completely. There are morally correct means to achieve what communications monitoring is claiming to.<br /><br />Communications monitoring is done on a daily basis, often by project supervisors who spend most of their time doing consultancy work outside the university. It is justified by universities as a need to monitor performance and is done without warning the researcher. <br /><br />Communications Monitoring provides the perfect platform for those senior academics/researchers to lift material from a researcher's space on the server as well as from his/her emails. Attempts by the researcher to establish his/her academic career, including obtaining research funds independently can be sabotaged by the senior researcher or academic. Sometimes ideas that are still being debated or are still in their infancy are hijacked by a morally-deficient (and ideas-deficient) senior researcher. The researcher is left with nothing to support his/her case but by pointing out to the sudden change in that academic's demonstrated line of thought or quality of work, which is usually attributed by a greedy university to the "natural evolution" in that academics thinking, even if it is a step change from what that academic has been doing for over a decade with the same research topic.<br /><br />The problem is made worse when his colleagues collude and distribute the ideas among themselves like a "war booty", or if the academic passes on the idea to a favoured researcher.Anonymousnoreply@blogger.com