Cyberloafing has become a significant issue

Assignment Help Basic Computer Science
Reference no: EM13845210

Part 1

Cyberloafing has become a significant issue to companies today. Cyberloafing costs companies millions of dollars each year. As a result, some companies have chosen to use various technologies to either prevent or catch employees that are spending their time online or on their phones doing non-work related activities such as shopping, playing games, or socializing. Do some research on cyberloafing. What are the costs to companies? How much time do employees spend doing non-work related activities? What are some of the tools employers are using? What are the laws in your state related to the use of these tools? Do you think the use of these tools is ethical? Why or why not?

Part 2 When answering these questions, please write 3 to 4 sentences on EACH topic.Give examples where appropriate. Use a minimum of two sources other than your book.Remember to cite your sources. APA format

Due to many changes in the corporate structure, and because we have instituted a new "Bring Your Own Device" policy, it is very important that we create a computer use policy for all employees to sign.This will alert them to potential ethical issues that may arise dueto the use of the company technology.Please research several computer use policies online.

You may use them as guides in development of our policy however, it is very important that you do not duplicate or copy any policy to avoid copyright infringement claims against the company

Task: Write a computer use policy.
1. Explain ethical computing
2.Explain plagiarism and copyright infringement.
a. What is the difference between the two?
b. How do you know if you are plagiarizing of violating copyright?
c. Research plagiarism and find an example of plagiarism that was in the news.
d. Explain copyleft.
3. Explain software piracy.
A. What are the penalties?
4.Sharing an Internet connection
a.Penalties
5. Explain ethical issues related to using social media.
a. Give a specific example where an employee was terminated due to actions on social media.
6. Explain an employer's legal right to review your activities using their technology. Give specific examples where the law has been upheld or applied
a. Keylogging
b. Reading emails
c. Monitoring Internet usage/sites visited

Reference no: EM13845210

Questions Cloud

Compare the umayyad caliphate and the abbasid caliphate : Compare and contrast the Umayyad caliphate and the Abbasid caliphate in regards to the following: imperial expansion and/or contraction, nature of rule, treatment of non-Muslims, and method of demise
Write short notes on citing electronic resources. : Write short notes on citing electronic resources.
Compare and contrast the toolkit used by hunter-gatherers : According to Thomas Kuhn, how does science normally progress? Compare and contrast the toolkit used by hunter-gatherers with that used by farmers
Impact of culture on human perception : 1. Explain the profound impact of culture on human perception. 2. Demonstrate appropriate language strategies in differing and multi-language speaking environments.
Cyberloafing has become a significant issue : Cyberloafing has become a significant issue to companies today. Cyberloafing costs companies millions of dollars each year. As a result, some companies have chosen to use various technologies to either prevent or catch employees that are spending ..
Explain what is hadoop : Explain what is Hadoop, how its fit into the Data Warehouse creation/utilization concept, what advantages its bring over the earlier and more traditional DW back-end technologies, and any other material on these topic that you find interesting.
Annotated bibliography assignment : A summary of the article's conclusions (please do not just copy from the article's abstract), which must be 3-5 sentences long.
International business plan : International Business Plan
Exactly what is an empire and how does it grow : Exactly what is an empire? How does it grow? What are the typical functions performed by an empire, and what are the main causes that typically lead to an empire's decline and demise

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How much memory is required to store picture

A 1024*768 image is displayed, noninterlaced, at a rate of thirty frames per second. If the image is stored with 64k-color resolution, which uses 2 bytes per pixel, how much memory is required to store the picture?

  Write a driver program with a main method to read in data

"Using the PetRecord class stored on the K: drive, write a driver program with a main method to read in data for five Pets and display the following data.

  Describe how you identified options for handling challenges

Describe how you identified/evaluated options for handling those challenges. Describe how you resolved/overcame the challenge(s)

  Describe ease of finding information on internet

Explain main elements of assignment in the substantive way. Describe the ease of finding information on the Internet.

  File managers

There are three main types of file managers used in different distributions of Linux. Orthodox file managers or "Commander-like" file managers have three windows (two panels and one command line window).The second type is the navigational file manage..

  Discuss whether you accept demand from manager

Discuss whether you should accept this demand from your manager or whether you should persuade your team to give their time to the organization rather than to their families. What factors might be significant in your decision?

  Imagine you are a senior systems administrator

Imagine you are a senior systems administrator who has recently been given the task to help improve security of your company's IT infrastructure after a series of network security breaches. These breaches included someone accessing the network ..

  Design linked list class hold customer name and phone number

Design your own linked list (LL) class to hold customer names and phone numbers. The class should have member functions for appending, inserting, deleting, searching and displaying nodes.

  What is the running time of your method

should handle at least one of the following common misspelling types: swapping two adjacent characters, inserting an extra character, deleting a single character, and replacing a character for another. What is the running time of your method?

  Tandem centre spool configuration is used in hydraulic

Name a few typical applications in which Tandem centre spool configuration is used in hydraulic system.

  What is the vulnerabilities of information system conference

What is the Vulnerabilities of information system Conference?

  What will be the values of h1 and h2

Consider two cache organizations both of them are using 32KB cache,32 bit physical address and 32B blocks. The 1st one is 2-way set associative cache, 2nd one is direct mapped cache

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd