Reference no: EM13757924
This topic represents the fourth participation event of this class. For this topic, the subject of government workplace monitoring and the potential suppression of constitutional rights are considered. Please review the article written by Lisa Rein entitled "More prying eyes on federal workers' computers" from the Washington Post of August 16, 2012. This article deals with the use of Spector-Soft software at the Food and Drug Administration (FDA).
The article states: "The software, sold by SpectorSoft of Vero Beach, Fla., could do more than vacuum up the scientists' e-mails as they complained tp lawmakers and others about medical devices they thought were dangerous. It could be programmed to intercept a tweet or Facebook post. It could snap screen shots of their computers. It could even track an employee's keystrokes, retrieve files from hard drives, or search for key-words." The article further states that "Government workers have long known their bosses can look over their shoulder to monitor their computer activity. But now prompted by the Wikileaks scandal and concerns over unauthorized disclosures,the government is secretly capturing a far richer, more granular picture of their communications, in real time." The article went on to state "Federal workers' personal computers are also increasingly seen as fair game, experts said."
Consider the following questions:
1. Despite the appearance of a banner that informs the user that they have "no reasonable expectation of privacy," is the use of Spector-Soft software or similar software to monitor federal employees in the workplace, ethical?
2. Does the use of Spector-Soft software "go beyond" normal workplace monitoring practices and does it hamper the content and frequency of normal employee to employee communication regarding agency work?
3. Could the data collected from the stepped up monitoring techniques be used to intimidate employees, coerce decision-making, or influence their performance appraisals?
Please address the three questions and feel free to add in other pertinent comments as you see fit!
Describe program which converts fahrenheit to celsius
: Create the following program which converts Fahrenheit to Celsius. Your program must have the following functions: Read integer Fahrenheit temperatures from the user. You need to check whether the input is the correct one or not. If the user enters..
|
Substantive tests of transactions
: Design tests of controls, substantive tests of transactions, and analytical procedures for the following Apollo Shoes cycles:
|
Why is it important to follow a troubleshooting methodology
: Why is it important to follow a troubleshooting methodology? When faced with a problem, why shouldn't you start trying fixes immediately
|
Prepare a personal budget-balance sheet
: Choose a client or yourself. For confidentiality purposes, use a fictitious name. Prepare a personal budget, balance sheet, and cash flow statement.
|
Similar software to monitor federal employees in workplace
: Despite the appearance of a banner that informs the user that they have "no reasonable expectation of privacy," is the use of Spector-Soft software or similar software to monitor federal employees in the workplace, ethical.
|
What is applied behavior analysis
: What is Applied Behavior Analysis (ABA) and how can this be used to teach children with ASD new skills? What needs to be considered when designing effective academic?
|
Design an audit program for the cycle
: Design an audit program for the cycle in no more than 1,050 words. Consider using a checklist or flowchart to outline your process.
|
Discuss the diseases gerd and copd
: Discuss the diseases GERD and COPD. Identify what each eponym stands for, the system that each affects, how they are treated, and the type of specialist that treats them
|
What intervention strategy you observe educator to be using
: Describe the skills you think Ayah is working on during this video clip. What intervention strategies you observe the educator to be using?
|