NTRODUCTION
The Internet has become a fully integrated part of our society, touching many aspects of our business and personal lives. The Internet is so incredibly popular because it enables us to not only quickly access information from sources all over the world, but also transfer information quickly and easily. Businesses were quick in seeing the benefits the Internet would provide their companies. Soon after phrases like “The Web” and “Web Surfing” began to circulate, computers with Internet capabilities became as commonplace as pencils and post-it-notes on employees’ desks. The positive affects the Internet merit, also leave room for the Internet’s negative affects as well. Access to the Internet from an employee’s computer allows that employee to spend time viewing content from non-work related sites. This is in essence what the Internet abuse problem is – spending paid work-time on non-work related activities. Internet abuse problems have become as multitudinous as the ways of dealing with them; only recently have companies started to deal with and recognize these issues. First we will attempt to understand who is affected by the Internet abuse problem; then by looking at the statistics and examples regarding Internet abuse, we can begin understanding the size and consequences of this problem. Finally we will also see what companies and employees are doing about it.
WHO IS INVOLVED?
Those affected by the Internet abuse problem are companies, employees, and the consumer. According to Network Magazine1 companies lose 54 billion dollars a year because of Internet abuse. That is money companies need to make up somehow, through raising prices, decreasing salaries, or some other method of cost reduction. Compani...
... middle of paper ...
...tect companies and their employees from those that would abuse the Internet. Things like standards and guidelines can also be used to ensure that the Internet is used in the right way. What can companies do to help prevent these problems? They can use guidelines and policies to make sure managers and employees understand what is expected of them. What can mangers do? They can make sure that their employees understand the guidelines and policies that their company has put in place. What can employees do? They can strive to uphold standards and guidelines and work with the mindset that they are always being watched. This will make Internet monitoring software unnecessary. One thing is for sure; the Internet is not going anywhere. Because of this, companies, management, and other employees need to ensure that the Internet is used productively and appropriately.
The internet is used today for many reasons. It is a platform for people to stay in touch with others, entertain themselves and complete work tasks. In the following articles, “Internet Addiction Left my Brother Homeless” by Winston Ross and “The Pointlessness of Unplugging” by Casey N. Cep, the internet is discussed very deeply, but in two varying lights. In the article by Cep the author is writing from personal experiences and research. In the article by Ross the author is writing merely from opinions. Another major difference in the two pieces is the main idea of the articles. In Cep’s article the main idea of his work is the idea of Unplugging from the internet. In Ross’s article, rather, the main point of his work is to discuss internet
When you think of the internet, usually what first comes to mind is social networking, online marketplaces, and other places that don’t sound that bad. Look deeper and you’ll find that the internet isn’t as nice as you thought it was. This “dark side” of the net is comprised of everything looked down upon in the real world – drugs, weapons, false identities, and even hit men for hire exist in this rough-and-tumble darknet. Not just physical products, but virtual products float around as well; from term papers to file sharing and even e-currency populate this dark area.
Part of the allure of the Internet has always been the anonymity it offers its users. As the Internet has grown however, causing capitalists and governments to enter the picture, the old rules are changing fast. E-commerce firms employ the latest technologies to track minute details on customer behavior. The FBI's Carnivore email-tracking system is being increasingly used to infringe on the privacy of netizens. Corporations now monitor their employees' web and email usage. In addition to these privacy infringements, Internet users are also having their use censored, as governments, corporations, and other institutions block access to certain sites. However, as technology can be used to wage war on personal freedoms, it can also be employed in the fight against censorship and invasion of privacy.
Cyber loafing is using personal internet during working hours (Liberman, Seidman, Mckenna & Buffardi 2011, pp. 2192). Cyber loafing is one of the issues that employees need to deal with at work. Websen (cited in Vitak et.al 2011, p. 1751) claims that there is a huge loses in work productivity in the US that cost the companies milli...
During the past decade, the internet has revolutionized and changed the way organizations do business by offering rapid communication systems and enhanced information access and innovation of technological advancements have created a brave new workplace. Further, the internet enables organizations to decrease expenses, reduce product life cycle time, market goods and services more efficiently (Anandarajan et al, 2000). However, with these kinds of benefits, the internet provides employees with a technique
Kharpal, A 2013, Cyber-crime is ‘greatest threat’ to companies survival: EY, CNBC, accessed 12 November 2013, http://www.cnbc.com/id/101155856
Every day millions in some cases billions of dollars are made by businesses from income brought in by online sale of products and services. As businesses continually develop and expand their client base with online products and services so does the desire by criminals to exploit vulnerabilities in their e-commerce setup. The mass worldwide internet usage growth within the last 20 years has been “an approximate 16 million users in 1995 to an estimated 2,937 million in March of 2014” As the importance of e-commerce increases so does the need to protect the technological infrastructure that will carry out online transactions for each business regardless of its size. I will attempt to highlight and review the history of a few cyber crimes to show the progression of the crimes within the last 30-40 years. I also plan to review how the economy and consumers are impacted by cyber crimes. Finally I will make an effort to contribute with information gathering on how to lower the risk of a cyber attack from and individual user to a large scale business.
In this report, I will be addressing e-mail, Internet use, and privacy policies in my workplace; the current laws regulating employee e-mail and Internet privacy; the reasons to companies carry out e-mail and Internet use policies; the assumptions employees make about their privacy at work; and how these policies affect employee privacy at work.
Ivarsson, Lars Larsson, Patrik. "Personal Internet Usage At Work: A Source Of Recovery." Journal Of Workplace Rights 16.1 (2011): 63. Advanced Placement Source. Web. 19 Apr. 2014.
Today, society is affected by the many advances in technology. These advances affect almost every person in the world. One of the prevalent advances in technology was the invention and mass use of the Internet. Today more than ever, people around the world use the Internet to support their personal and business tasks on a daily basis. The Internet is a portal into vast amounts of information concerning almost every aspect of life including education, business, politics, entertainment, social networking, and world security. (idebate.com) Although the Internet has become a key resource in developing the world, the mass use of Internet has highlighted a major problem, privacy and the protection of individual, corporate, and even government security . The argument over whether or not the Internet should be controlled by the government has developed into a controversial issue in almost every country in the world.
One particular crime that could be committed by employees who use the internet at work is hacking. Hacking is one of the most well-known types of computer crimes, in this context, the term refers to the unauthorized access of another’s computer system (HG.org Staff, 2015). This means that if the employee in not allowed to use the internet, for personal use, than there is a possibility that they could get charged for such crime. Because the policy will state they do not have the authority to access the organizations computer system for personal use. In addition, they must know that all use of computers systems while at work will be monitor, including e-mails. Piracy and cyber terrorism are other crimes that one can face when using a computer
The Internet is a connection of computers across the world through a network. Its origin dates back to the 1960s when the U.S Military used it for research, but it became more available to the public from the late 1980s. The World Wide Web was created in 1989 and browsers began appearing in the early 1990s. Over the last 24 years, the Internet has enabled people to shop, play, do research, communicate and conduct business online. It has also become cheaper and faster in performing different tasks. As much as the Internet has done immeasurable good to society, it has also dominated people’s lives and brought with it an array of cybercrimes. According to Nicholas Carr in his book The Shallows: How the Internet is Changing the Way we Think, Read and Remember (Carr, 2010). He debates on whether the Internet has done more harm than good. People use the Internet daily to exchange accurate information and constantly personal data such as credit cards, passwords and Social Security numbers are travelling through the network from one computer to another. With security measures put in place on the Internet, personal information remains confidential. But unfortunately, criminals have adapted to innovations in technology, and today, more people are increasingly becoming victims of cybercrime. The Internet has had profound effects on the public, both positive and negative. In this paper we will examine how access to personal information has led to an increase in online and offline crimes. The essay will particularly focus on ecommerce and hacking.
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side from an individual citizen, to small groups, businesses, and the government, to the countries of the world. There are different groups from law enforcement agencies to the U.S. Secret Service, that are attempting to combat the problem through cooperation and preemptive efforts. If these groups combined with the public to protect themselves and the country from criminals that commit cybercrime, the nation’s network and technology servers would be much safer for technology users. Clearly, cybercrime is a problem because it puts internet users at risk of being taken advantage of or harmed.
Internet addiction is a growing problem with more and more people. The internet is much more accessible to people now than it was just a few years ago. The internet provides people with entertainment, loads of information, and an escape from everyday life, but like anything else, too much a good thing can be addictive. This paper will cover what internet addiction is, warning signs of internet addiction, problems caused by internet addiction, who develops internet addiction, preventing and treating internet addiction, and safety guidelines for internet users.
As the internet has evolved it is now a part of many people’s daily lives and with that, many could not function or conduct their daily business or lives without it. It is impressive that we can now communicate and even see someone all the way across the country with just a few clicks of a mouse. But as technology changes and progresses seemingly for the good, many will always find ways to exploit technology and use it with the intent of committing crime, turning a positive tool into a negative one. As such the negative side of the World Wide Web, cybercrime has evolved as just one of the major disadvantages of the internet. Cybercrime itself is a broad term and can and does include any crime that is committed via the internet or computer network including seemingly minor acts as downloading music, to denial of service attacks, to even acts of cyber-terrorism. With the newly formed threat of cybercrime has also come new ways for law enforcement to attack and prevent it as well but with limited resources not much can be changed but to continue to prevent new methods from approaching the cybercrime world. This is not only just in our own neighborhoods but is at an international scale. This paper generates the insight about the overall rise of cybercrime among our societies. The main focus of this paper is to describe the types of computer crimes and its effects on individuals and businesses.