<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE Publisher PUBLIC "-//MetaPress//DTD MetaPress 2.0//EN" "http://public.metapress.com/dtd/MPRESS/MetaPressv2.dtd">
<Publisher>
	<PublisherInfo>
		<PublisherName>Baywood Publishing Company</PublisherName>
	</PublisherInfo>
	<Journal>
		<JournalInfo JournalType="Journals">
			<JournalPrintISSN>1938-4998</JournalPrintISSN>
			<JournalElectronicISSN>1938-5005</JournalElectronicISSN>
			<JournalTitle>Journal of Workplace Rights</JournalTitle>
			<JournalCode>BWWR</JournalCode>
			<JournalID>121043</JournalID>
			<JournalURL>http://baywood.metapress.com/link.asp?target=journal&amp;id=121043</JournalURL>
		</JournalInfo>
		<Volume>
			<VolumeInfo>
				<VolumeNumber>13</VolumeNumber>
			</VolumeInfo>
			<Issue>
				<IssueInfo IssueType="Regular">
					<IssueNumberBegin>2</IssueNumberBegin>
					<IssueNumberEnd>2</IssueNumberEnd>
					<IssueSupplement>0</IssueSupplement>
					<IssuePartStart>0</IssuePartStart>
					<IssuePartEnd>0</IssuePartEnd>
					<IssueSequence>000013000220080101</IssueSequence>
					<IssuePublicationDate>
						<CoverDate Year="2008" Month="1" Day="1"/>
						<CoverDisplay>Number 2 / 2008</CoverDisplay>
					</IssuePublicationDate>
					<IssueID>U33832113650</IssueID>
					<IssueURL>http://baywood.metapress.com/link.asp?target=issue&amp;id=U33832113650</IssueURL>
				</IssueInfo>
				<Article ArticleType="Original">
					<ArticleInfo Free="No" ESM="No">
						<ArticleDOI>10.2190/WR.13.2.e</ArticleDOI>
						<ArticlePII>00206214H6287837</ArticlePII>
						<ArticleSequenceNumber>5</ArticleSequenceNumber>
						<ArticleTitle Language="En">Forensic Computing in the Workplace: Hegemony, Ideology, and the Perfect Panopticon?</ArticleTitle>
						<ArticleFirstPage>167</ArticleFirstPage>
						<ArticleLastPage>183</ArticleLastPage>
						<ArticleHistory>
							<RegistrationDate>20081118</RegistrationDate>
							<ReceivedDate>20081118</ReceivedDate>
							<Accepted>20081118</Accepted>
							<OnlineDate>20081118</OnlineDate>
						</ArticleHistory>
						<FullTextFileName>00206214H6287837.pdf</FullTextFileName>
						<FullTextURL>http://baywood.metapress.com/link.asp?target=contribution&amp;id=00206214H6287837</FullTextURL>
						<Composite>2</Composite>
					</ArticleInfo>
					<ArticleHeader>
						<AuthorGroup>
							<Author AffiliationID="A1">
								<GivenName>Bernd</GivenName>
								<Initials>Carsten</Initials>
								<FamilyName>Stahl</FamilyName>
								<Degrees/>
								<Roles/>
							</Author>
							<Affiliation AFFID="A1">
								<OrgDivision/>
								<OrgName>De Montfort University, Leicester, United Kingdom</OrgName>
								<OrgAddress/>
							</Affiliation>
						</AuthorGroup>
						<Abstract Language="En">Forensic computing is an emerging academic discipline and professional field. Most publications in the area concentrate on technical issues related to the provision of digital evidence that can stand up to scrutiny in a court of law. There is a generally shared assumption that forensic computing activities are legitimate and in the best interests of society. This article aims to shed doubt on that prevailing narrative. The article uses some of the concepts of critical theory as applied in critical research in information systems and critical legal studies to point to some potential problems of forensic computing in the workplace. Drawing on traditional critical theory, the article argues that forensic computing can be used as a hegemonic means to uphold ideology even when it is used in law enforcement. Further problems arise due to the use of forensic computing by private organisations. An obvious use to which forensic computing can be put in corporations is that of employee surveillance. The parallel between forensic computing and the Panopticon is explored. The article concludes by discussing the relationship between the different critical approaches and the ways in which these approaches can inform us about the future use of forensic computing in the workplace.</Abstract>
						<biblist>
							<bib-other>
								<bibtext seqNum="1">ACPO. n.d. &lt;b&gt;&lt;i&gt;Good practice guide for computer based electronic evidence.&lt;/i&gt;&lt;/b&gt; Retrieved from &lt;a target=&quot;_blank&quot; href='http://www.acpo.police.uk/asp/policies/Data/gpg_computer_based_evidence_v3.pdf'&gt;www.acpo.police.uk/asp/policies/Data/gpg_computer_based_evidence_v3.pdf&lt;/a&gt;</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="2">Adam, A. 2005. &lt;b&gt;&lt;i&gt;Gender, ethics and information technology.&lt;/i&gt;&lt;/b&gt; Basingstoke, UK: Palgrave Macmillan.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="3">Ashendon, S., &amp; Owen, D. 1999. &lt;b&gt;&lt;i&gt;Foucault contra Habermas: Recasting the dialogue between genealogy and critical theory.&lt;/i&gt;&lt;/b&gt; London: Sage.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="4">Bloomfield, B. P., &amp; Coombs, R. 1992. Information technology, control, and power: The centralization and decentralization debate revisited. &lt;b&gt;&lt;i&gt;Journal of Management Studies&lt;/i&gt;&lt;/b&gt;, 29: 459-484.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="5">Caloyannides, M. A. 2006. Digital &quot;evidence&quot; is often evidence of nothing. In P. Kanellis, E. Kiountouzis, N. Kolokotronis, &amp; D. Martakos (Eds.), &lt;b&gt;&lt;i&gt;Digital crime and forensic science in cyberspace:&lt;/i&gt;&lt;/b&gt; 334-339. Hershey, PA: Idea Group.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="6">Casey, E. 2006. Investigating sophisticated security breaches. &lt;b&gt;&lt;i&gt;Communications of the ACM&lt;/i&gt;&lt;/b&gt;, 49(2): 48-54.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="7">Fitzpatrick, P., &amp; Hunt, A. 1987. &lt;b&gt;&lt;i&gt;Critical legal studies.&lt;/i&gt;&lt;/b&gt; Oxford: Blackwell.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="8">Foucault, M. 1971. &lt;b&gt;&lt;i&gt;L'ordre du discours.&lt;/i&gt;&lt;/b&gt; Paris: Gallimard.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="9">Foucault, M. 1975. &lt;b&gt;&lt;i&gt;Surveiller et punir: Naissance de la prison.&lt;/i&gt;&lt;/b&gt; Paris: Gallimard.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="10">Foucault, M. 1976. &lt;b&gt;&lt;i&gt;Histoire de la sexualité I: La volonté de savoir.&lt;/i&gt;&lt;/b&gt; Paris: Gallimard.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="11">Freeden, M. 2003. &lt;b&gt;&lt;i&gt;Ideology—A very short introduction.&lt;/i&gt;&lt;/b&gt; Oxford: Oxford University Press.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="12">Gouldner, A. W. 1976. &lt;b&gt;&lt;i&gt;The dialectic of ideology and technology: The origins, grammar and future of ideology.&lt;/i&gt;&lt;/b&gt; London: Macmillan.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="13">Grint, K., &amp; Woolgar, S. 1997. &lt;b&gt;&lt;i&gt;The machine at work: Technology, work, and organization.&lt;/i&gt;&lt;/b&gt; Cambridge, UK: Blackwell.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="14">Harris, R. 2006. Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem. &lt;b&gt;&lt;i&gt;Digital Investigation&lt;/i&gt;&lt;/b&gt;, 3: S44-S49.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="15">Harvey, L. 1990. &lt;b&gt;&lt;i&gt;Critical social research.&lt;/i&gt;&lt;/b&gt; London: Unwin Hyman.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="16">Hawkes, D. 2003. &lt;b&gt;&lt;i&gt;Ideology&lt;/i&gt;&lt;/b&gt; (2nd ed.). London: Routledge.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="17">Howcroft, D., &amp; Trauth, E. 2005. &lt;b&gt;&lt;i&gt;Handbook of critical information systems research: Theory and application.&lt;/i&gt;&lt;/b&gt; Cheltenham, UK: Edward Elgar.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="18">Introna, L. 2001. Workplace surveillance, privacy, and distributive justice. In R. A. Spinello &amp; H. T. Tavani (Eds.), &lt;b&gt;&lt;i&gt;Readings in cyberethics&lt;/i&gt;:&lt;/b&gt; 418-429. Sudbury, MA: Jones and Bartlett.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="19">Kelly, M. 1994. &lt;b&gt;&lt;i&gt;Critique and power: Recasting the Foucault/Habermas debate.&lt;/i&gt;&lt;/b&gt; Cambridge, MA: MIT Press.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="20">Kelman, M. 1987. &lt;b&gt;&lt;i&gt;A guide to critical legal studies.&lt;/i&gt;&lt;/b&gt; Cambridge, MA: Harvard University Press.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="21">Kenneally, E. 2002. Computer forensics: Beyond the buzzword. &lt;b&gt;&lt;i&gt;;login:&lt;/i&gt;&lt;/b&gt;, 27(4): 8-11.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="22">Kincheloe, J. L., &amp; McLaren, P. 2005. Rethinking critical theory and qualitative research. In N. K. Denzin &amp; Y. S. Lincoln (Eds.), &lt;b&gt;&lt;i&gt;The SAGE handbook of qualitative research&lt;/i&gt;&lt;/b&gt; (3rd ed.): 305-342. Thousand Oaks, CA: Sage.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="23">Kohli, R., &amp; Kettinger, W. J. 2004. Informating the clan: Controlling physicians' costs and outcomes. &lt;b&gt;&lt;i&gt;MIS Quarterly&lt;/i&gt;&lt;/b&gt;, 28(3): 363-394.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="24">Malinowski, C. 2006. Training the cyber investigator. In P. Kanellis, E. Kiountouzis, N. Kolokotronis, &amp; D. Martakos (Eds.), &lt;b&gt;&lt;i&gt;Digital crime and forensic science in cyberspace&lt;/i&gt;:&lt;/b&gt; 311-333. Hershey. PA: Idea Group.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="25">Mansell, W., Meteyard, B., &amp; Thomson, A. 1999. &lt;b&gt;&lt;i&gt;A critical introduction to law&lt;/i&gt;&lt;/b&gt; (2nd ed.). London: Cavendish Publishing.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="26">McLellan, D. 1995. &lt;b&gt;&lt;i&gt;Ideology&lt;/i&gt;&lt;/b&gt; (2nd ed.). Buckingham, UK: Open University Press.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="27">Mitrakas, A., &amp; Zaitch, D. 2006. In P. Kanellis, E. Kiountouzis, N. Kolokotronis, &amp; D. Martakos (Eds.), &lt;b&gt;&lt;i&gt;Digital crime and forensic science in cyberspace&lt;/i&gt;:&lt;/b&gt; 267-290. Hershey, PA: Idea Group.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="28">Mumford, E. 1999. &lt;b&gt;&lt;i&gt;Dangerous decisions—Problem solving in tomorrow's world.&lt;/i&gt;&lt;/b&gt; New York: Kluwer Academic/Plenum Publishing.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="29">Myers, M., &amp; Rogers, M. 2004. Computer forensics: The need for standardization and certification. &lt;b&gt;&lt;i&gt;International Journal of Digital Evidence&lt;/i&gt;&lt;/b&gt;, 3(2): 1-11.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="30">Newsham, T., Palmer, C., Stamos, A., &amp; Burns, J. 2007. &lt;b&gt;&lt;i&gt;Breaking forensics software: Weaknesses in critical evidence collection.&lt;/i&gt;&lt;/b&gt; Retrieved from &lt;a target=&quot;_blank&quot; href='http://www.isecpartners.com/files/iSEC-Breaking_Forensics_Software-Slides.BH2007.pdf'&gt;www.isecpartners.com/files/iSEC-Breaking_Forensics_Software-Slides.BH2007.pdf&lt;/a&gt;</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="31">Nissenbaum, H. 2005. Where computer security meets national security. &lt;b&gt;&lt;i&gt;Ethics and Information Technology&lt;/i&gt;&lt;/b&gt;, 7(2): 61-73.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="32">Nye, D. 2002. The &quot;privacy in employment&quot; critique: A consideration of some of the arguments for &quot;ethical&quot; HRM professional practice. &lt;b&gt;&lt;i&gt;Business Ethics: A European Review&lt;/i&gt;&lt;/b&gt;, 11(3): 224-232.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="33">Poullet, Y. 2004. The fight against crime and/or the protection of privacy: A thorny debate! &lt;b&gt;&lt;i&gt;International Review of Law, Computers and Technology&lt;/i&gt;&lt;/b&gt;, 18(2): 251-273.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="34">Privacy Rights Clearinghouse. 2004. &lt;b&gt;&lt;i&gt;A review of the fair information principles: The foundation of privacy public policy.&lt;/i&gt;&lt;/b&gt; Retrieved from &lt;a target=&quot;_blank&quot; href='http://www.privacyrights.org/ar/fairinfo.htm'&gt;www.privacyrights.org/ar/fairinfo.htm&lt;/a&gt;</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="35">Stahl, B. C. 2004. Whose discourse? A comparison of the Foucauldian and Habermasian concepts of discourse in critical IS research. &lt;b&gt;&lt;i&gt;Proceedings of the Tenth Americas Conference on Information Systems:&lt;/i&gt;&lt;/b&gt; 4329-4336.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="36">Stahl, B. C. 2006. Is forensic computing a profession? Revisiting an old debate in a new field. &lt;b&gt;&lt;i&gt;Journal of Digital Forensics, Security and Law&lt;/i&gt;&lt;/b&gt;, 1(4): 49-66.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="37">Stahl, B. C. 2007. &lt;b&gt;&lt;i&gt;Prolegomena to a critical investigation of forensic computing.&lt;/i&gt;&lt;/b&gt; Unpublished LLM thesis, De Montfort University, Leicester, UK.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="38">Stahl, B. C. 2008a. The impact of the UK Human Rights Act 1998 on privacy protection in the workplace. In R. Subramanian (Ed.), &lt;b&gt;&lt;i&gt;Computer security, privacy, and politics: Current issues, challenges, and solutions:&lt;/i&gt;&lt;/b&gt; 55-68. Hershey, PA: Idea Group.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="39">Stahl, B. C. 2008b. &lt;b&gt;&lt;i&gt;Information systems: Critical perspectives.&lt;/i&gt;&lt;/b&gt; London: Routledge.</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="40">Wall, C., &amp; Paroff, J. 2005. Cracking the computer forensics mystery. &lt;b&gt;&lt;i&gt;The Computer and Internet Lawyer&lt;/i&gt;&lt;/b&gt;, 22(4): 1-6</bibtext>
							</bib-other>
							<bib-other>
								<bibtext seqNum="41">Weckert, J. 2005. &lt;b&gt;&lt;i&gt;Electronic monitoring in the workplace: Controversies and solutions.&lt;/i&gt;&lt;/b&gt; Hershey, PA: Idea Group.</bibtext>
							</bib-other>
						</biblist>
					</ArticleHeader>
				</Article>
			</Issue>
		</Volume>
	</Journal>
</Publisher>
