Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Impact of the internet on people's lives
Impact of the internet on people's lives
Impact of the internet on people's lives
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Impact of the internet on people's lives
The Internet and the Workplace
The Internet has become a pervasive presence in the American workplace. Two-thirds of employees in medium and large companies in the United States now have Internet access, compared with fifteen percent only two years ago, according to a sampling of 500 companies surveyed by the IntelliQuest Corporation. (IntelliQuest)
Workers with Web access typically spend five to ten hours per week sending personal e-mail or searching for information not specifically related to their jobs. Popular entertainment sites, such as ESPN's Sport Zone, where visitors can check sport scores, and POGO where they can play games sustain heavy traffic during the work day. As everything from CD's to cars go on sale over the Web, some employees are also spending more time shopping on line.
The Internet offers many new opportunities for companies. Companies using the Internet can reduce operating costs, because human tasks can be automated, data can be transferred more efficiently, and the company needs less real estate and inventory. In addition, companies using the Internet can monitor their competition, quickly retrieve information, and facilitate communication with employees and customers. The establishment of a site on the World Wide Web enables companies to operate on a larger scale, and easily expand product lines.
However, in addition to using the Internet, especially the World Wide Web and e-mail for work-related purposes, employees are also using the Internet for personal use, whether for sending personal e-mail messages, playing games, downloading pornography, ordering goods online, checking stock prices, or gambling. Accordingly, many issues have come to light involving employee e-mail and Internet use. Em...
... middle of paper ...
...any. I think that this should be viewed as an invasion of privacy. If the company thinks that the employee has violated their employment rights by posting untrue things about the company then each case should be viewed individually. If the employer feels that slander has occurred then take the offender to court don't violate everyone else's civil rights because of one malcontent.
Bibliography
IntelliQuest Information Group, Inc., Latest IntelliQuest Survey Reports 62 Million American Adults Access the Internet/Online Services (Feb. 5, 1998) http://www.intelliquest.com/about/release41.htm
James A. Martin, You Are Being Watched, PC World, Nov. 1997,
Adam J. Conti & James W. Wimberly, The Developing Law of Cyberspace (Jan. 1996)
Society for Human Resource Management (SHRM), Technology Raises Legal Questions, Visions (May/June 1996) (visited May 8, 1998)
Walsh, D. (2012). Employment law for human resource practice. (4 ed.). Macon: South-Western Legal Studies in Business.
In summary, “Internet activities are not most significant in competition, such as informing customers, processing transactions, and procuring inputs”. (Porter, 2001) significant corporate assets--skilled employees, proprietary product, and efficient logistical systems – these factors are the most important to keep competitive advantages. In fact, it is foreseeable that the Internet's evolution will come up in the future involve a shift “in thinking from e-business to business, from e-strategy to strategy”. (Porter, 2001)Only by integrating the Internet into overall strategy will this powerful new technology become an equally powerful force for competitive advantage.
Many Americans look for various forms of entertainment. From watching television, to attending sporting events, and surfing the Internet. Millions of people use the Internet every day. In fact, 277,436,130 people in America use the Internet. That is 87% of the United States population, and.
Smith, S. (2002). Rethinking e-mail monitoring in today's workplace. Westchester County Business Journal, 41(12), p. 4. Retrieved October 19, 2004, from EBSCOhost Database.
How much information should be collected on employees and prospective employees? Collecting information presents risks that employers will be faced with when employees commit torts outside the scope of their jobs. Also, not collecting the proper information could result in risks depending on the case. These questions will be analyzed based on collected data and employer actual or constructive knowledge. In order to precisely elaborate about the risk and such, I will look at the employee monitoring at work, Electronic Communications Privacy Act of 1986, and respondeat superior.
We all know that the daily commute can be very long and frustrating. Traffic can often cause long delays. These delays cause stress to you, your boss and the coworkers that have to cover for you until you make it into the office. Today there is a new highway that everyone can use to get to work. The delays on this highway are measured in microseconds rather than hours. It is the Information Superhighway. The Information Superhighway has the ability to connect together every computer in every part of the world. This kind of access allows individuals to do research, marketing, communications, sales and a wide range of other tasks normally completed at the office, from the comfort and convenience of their own home. This was the basic principle that started a new trend in business known as telecommuting. This paper will give you the information you need to have a good understanding of what telecommuting is and why it is becoming so popular. In addition, it will discuss how businesses design telecommuting jobs, how they work and how they are managed.
The decision to monitor e-mail is left to the organization that provides the e-mail service to users. These organizations can range from educational institutions and private corporations, to governments and non-profit organizations. Each of these different types of organizations has a different agenda and goals, not only in general, but also for their members-and more specifically, for their members' e-mail. While educational institutions can provide e-mail facilities to their constituents for the purposes of convenience, employers almost always maintain e-mail facilities for the sole purpose of improving the on-the-job productivity of their employees.
In today's competing world, many organizations are rethinking their strategies in terms of the online business and its capabilities and culture. Organizations are taking advantage of the widespread web to buy and sell goods from other companies and recently from individual customers. Exploiting these opportunities of convenience, availability and widespread reach of the web or Internet, many companies such as Amazon have benefited from the use of web successfully.
“Average Time Spent Online per U.S. Visitor in 2010”. Engagment, U.S. (13 Jan. 2011).Web.30 Mar.2014.
Centralization and management of data using mainframe and minicomputers were diminished. Yet, during those times, organizations still retained tight control over the computing devices their employees could use. However, around the turn of the millennium, computers became more affordable, mobile, and connected. Additionally, home computers became increasingly used for after office hours’ work (McLellan, 2013).
The privacy of all personnel information held within an employer’s database are protected and controlled by a number of federal statutes. The employee has the basic rights that protect each employee privacy so that their information is not shared without their prior knowledge or with any outside company. Moreover, employees may not like that their computer, email and/or internet use is monitored and stored with the company’s database, but the employer has the rights to know how its equipment
The researcher had gained knowledge about the habit of cyberloafing, and how it affects the employees’ productivity and performance at the workplace and the different deviant behaviors that arise. Cyberloafing refers to be involved in non-work related Internet activities during work hours. This researched helped to sort out negative aspects of cyber loafing at work place, which will help the organization improve their policies to maintain a productive working environment and to limit off or block internet bandwidth in order to prevent cyber loafing which reduces or destroys system
The world is getting smaller, yet remains full of possibilities due in part to technology. Interestingly, the very first emails could only be sent to someone using two computers, literally side by side. Technology dates back to the first manipulations of materials to assist in human survival. There are many definitions for technology, John D. Carl describes technology stating,” it deals with the creation, use, and application of knowledge and its’ interrelation with life, society, and the environment” (Carl, J.D., 2011, p.301). For the purpose of this paper, any instrument, invention, or method influencing and allowing people to control or adapt to their environment, is technology. With the increased availability of technological tools (smart phones, text messaging, image scanning, email, and social media), communication is rapidly changing. Society has moved beyond the Industrial Age and into the Information Age, where the sharing of knowledge and ideas is the new driver of power and world economy. Technology possesses many merits, and as with any tool, it carries drawbacks. Misuse and overuse creates unsavory dependence. This dependence can have adverse affects on people, business, and education. Technology receives vast criticism for reducing face-to-face interactions. Although the information technology of today is widely held as impersonal, it promotes communication; technology reduces costs and leverages productivity by facilitating access to information and knowledge, and augmenting interaction amongst those who utilize technology.
In Australia, Employers should implement best practice on how to maintain privacy in the workplace in accordance with the privacy standards set out in the Australian Privacy Principles (APPs) (Welcome to the Fair Work Ombudsman website. n.d.). Privacy is able to keep our own personal information private and also able to do things without any electronic monitoring in the workplace. Nowadays, many company increased the usage of technology such as internet and email in the workplace. This can create issues in privacy. When employees’ access to web browsing activities during working hours, the employer can be scrutinized it. Employers take this action due to fear lawsuit if employees act in inappropriate ways. Therefore, the best policy is to explain clearly how is appropriate to use email and internet at work and outline what type of use is prohibited in the workplace. Besides that, employer also needs to ensure the employee didn’t disclose or disseminate any important information to the competitors or
One particular crime that could be committed by employees who use the internet at work is hacking. Hacking is one of the most well-known types of computer crimes, in this context, the term refers to the unauthorized access of another’s computer system (HG.org Staff, 2015). This means that if the employee in not allowed to use the internet, for personal use, than there is a possibility that they could get charged for such crime. Because the policy will state they do not have the authority to access the organizations computer system for personal use. In addition, they must know that all use of computers systems while at work will be monitor, including e-mails. Piracy and cyber terrorism are other crimes that one can face when using a computer