StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Companies Monitoring Employees Computer Usage - Essay Example

Cite this document
Summary
According to Anandarajan and Simmers, "Most large organizations that are providing internet access to their employees are also providing some means to monitor and control that usage" (142). It is not uncommon to find employees surfing the internet particularly using the social…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Companies Monitoring Employees Computer Usage
Read Text Preview

Extract of sample "Companies Monitoring Employees Computer Usage"

Companies Monitoring Employees Computer Usage According to Anandarajan and Simmers, "Most large organizations that are providing internet access to their employees are also providing some means to monitor and control that usage" (142). It is not uncommon to find employees surfing the internet particularly using the social media during company time. It is important to note that the main objective of technology in the workplace is to increase productivity through enhancing efficiency (Anandarajan and Simmers 143).

However, if technology is misused, productivity can negatively be affected. To prevent incidences of employees misusing company time surfing the internet, action plans have been introduced in many organizations to help identify employees involved in such activities. For instance, some sniffers on computer usage can show all the key strokes a person has made on a company computer. This can act as the basis for firing employees found to have a habit of misusing company time surfing the internet.

Other than reasons pertaining to productivity, there are also other reasons why organizations monitor and control internet usage. A good example includes legal liabilities that may arise due to misuse of technology (Anandarajan and Simmers 144). For instance, an employee may use the company internet to download and distribute pornographic materials. If such materials falls into the wrong hands, the company could be sued for casualness. Sending pornographic materials to colleagues in the workplace could also be considered sexual molestation and the company could also be liable if necessary steps are not taken to address the problem (Anandarajan and Simmers 144).

In a nutshell, monitoring and controlling internet usage in the workplace increase productivity and minimizes the likelihood of paying for legal damages. Work citedAnandarajan, Murugan, and Simmers Claire. Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management. London: Information Science Publishing, 2004. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Companies Monitoring Employees Computer Usage Essay”, n.d.)
Companies Monitoring Employees Computer Usage Essay. Retrieved from https://studentshare.org/management/1666615-companies-monitoring-employees-computer-usage
(Companies Monitoring Employees Computer Usage Essay)
Companies Monitoring Employees Computer Usage Essay. https://studentshare.org/management/1666615-companies-monitoring-employees-computer-usage.
“Companies Monitoring Employees Computer Usage Essay”, n.d. https://studentshare.org/management/1666615-companies-monitoring-employees-computer-usage.
  • Cited: 0 times

CHECK THESE SAMPLES OF Companies Monitoring Employees Computer Usage

Behavioural Finance in Business

Tapping telephone calls, monitoring computer and internet usage, and screening e-mails are some of the common employee surveillance practices.... According to the 2007 Electronic Monitoring & Surveillance Survey conducted by the American Management Association (AMA 2007), nearly 45% of business organizations monitor their employees' computer, internet, and phone usage.... This paper will critically discuss the influence of workplace surveillance on managing people at work from the perspectives of both employers and employees....
7 Pages (1750 words) Essay

Research and discuss the following: Is Employer Monitoring of Employee E-Mail Justified

This technology reduces paper usage in the company and also enables the companies save on space that would otherwise be used to store letters and other correspondences.... hellip; Access to the internet has become an integral and fundamental part of employees' work stations and has also contributed to increased productivity of employees; enabling organizations meet their targets and objectives (Steiner & Steiner, 2012, 86).... With access to the internet in most work places, the use of electronic mail (e-mail) as one of the main channels of communication has not only become a major characteristic of business communications, but also one of the main ways through which employees communicate amongst themselves and with their friends....
3 Pages (750 words) Research Paper

Computer Science-Information System

This is a part of computer crime prevention measures with usage of specialized encrypting and authentication hardware and software, anti-malware programs such as Internet filters, firewalls, antiviruses, intrusion detection systems, etc.... It is obvious that working conditions in IT Company must be designed to prevent computer crimes and simultaneously to avoid negative ethical consequences of prevention procedures.... These violations can be classified as computer crimes and often related to industrial espionage and information "wars" between competing companies....
3 Pages (750 words) Essay

Electronic Monitoring System Implementation

Up-to-date technologies put together it feasible for organizations to view numerous activities of their worker's occupation, predominantly on computer terminals, telephones in the course of voice mail, electronic as well as when workers are making use of the Internet.... Since electronic monitoring as well comprises utilize of computer forensics, a comparatively innovative discipline as well as a significant progression in the wider areas of computer evidence and electronic monitoring (King, 2009)....
7 Pages (1750 words) Case Study

United States v. Angevine

Complements from companies usually include other… Equipments such as computers, laptops, phones etc provided by the company accompany their usage regulations and are, thus, monitored for usage.... Equipments such as computers, laptops, phones etc provided by the company accompany their usage regulations and are, thus, monitored for usage.... All companies that provide such equipment to their employees also clarify usage criteria and regulations, monitoring schedules, and any other policies attached to the usage....
2 Pages (500 words) Essay

Privacy Issues in the Workplace- Technology and Social Media

Since the employer own s the computer and the terminals, he therefore has a right to monitor an employee's computer usage.... On the other hand, computer monitoring comes in handy where employers use computer software to access the screen or stored in the employees computer terminals and hard disks.... Other laws governing the privacy of employees in a working environment include the National Labor Relations Act (NLRA) that forbids an Privacy Issues in the Workplace There is increasing technological advancements that relate to computer technology, mobile phone technology, internet applications, and improved networking....
2 Pages (500 words) Essay

Orlov online monitoring : A Threat to employee privacy in the wired workplace ( research MLA )

Most Company-based policies on the Internet usage have overly been a common phenomenon thus can be comparable to initial policies… In 2005, the American Management Association and ePolicy Institute, in a study, recommended that only 76% of the companies were found to monitor employee's use of the web (Hacker et al.... As opposed to other company rules, Internet usage policies, in most cases, include the secret monitoring of the language authorization.... As much as companies are allowed by law to legitimately monitor employees' internet usage from expensively productive security breaches, the benefits of electronically based surveillance system outweighs the costs of employees' autonomy and autonomy (Gibaldi 102)....
4 Pages (1000 words) Assignment

Controlling Cyber Deviance in the Workplace

Due to widespread Internet usage for such a company, chances of possible cyber deviance among the employees are very high.... The action plan to reduce cyber deviance for the enterprise is the Internet Acceptable usage Policy (IAUP).... nbsp; … Many companies provide their employees with Internet access to facilitate their jobs.... nbsp;  Cyber deviance is on the rise in many workplaces as most employees engage in Internet abuse unrelated to work....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us