Miguel Afonso Caetano<p><a href="https://tldr.nettime.org/tags/WorkSurveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WorkSurveillance</span></a> <a href="https://tldr.nettime.org/tags/Surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Surveillance</span></a> <a href="https://tldr.nettime.org/tags/WageSlavery" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WageSlavery</span></a> <a href="https://tldr.nettime.org/tags/SIEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIEM</span></a> <a href="https://tldr.nettime.org/tags/UEBA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UEBA</span></a> <a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatDetection</span></a> <a href="https://tldr.nettime.org/tags/BehaviorProfiling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BehaviorProfiling</span></a>: "This case study explores, examines and documents how employers can use software that analyzes extensive personal data on employee behavior and communication for cybersecurity, insider threat detection and compliance purposes. To illustrate wider practices, it investigates software for “security information and event management” (SIEM), “user and entity behavior analytics” (UEBA), insider risk management and communication monitoring from two major vendors. First, it looks into cybersecurity and risk profiling systems offered by Forcepoint, a software vendor that was until recently owned by the US defense giant Raytheon. Second, it investigates in detail how employers can use cybersecurity and risk profiling software sold by Microsoft, whose “Sentinel” and “Purview” systems provide SIEM, UEBA, insider risk management and communication monitoring functionality. Combined, these systems can monitor everything employees do or say, profile their behavior and single them out for further investigation. Similar to predictive policing technologies, they promise not only to detect incidents but to prevent them before they occur. While organizations can use these software systems for legitimate purposes, this study focuses on their potential implications for employees."</p><p><a href="https://crackedlabs.org/en/data-work/publications/securityriskprofiling" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">crackedlabs.org/en/data-work/p</span><span class="invisible">ublications/securityriskprofiling</span></a></p>