Cyberloafing has become a significant issue

Assignment Help Basic Computer Science
Reference no: EM13845210

Part 1

Cyberloafing has become a significant issue to companies today. Cyberloafing costs companies millions of dollars each year. As a result, some companies have chosen to use various technologies to either prevent or catch employees that are spending their time online or on their phones doing non-work related activities such as shopping, playing games, or socializing. Do some research on cyberloafing. What are the costs to companies? How much time do employees spend doing non-work related activities? What are some of the tools employers are using? What are the laws in your state related to the use of these tools? Do you think the use of these tools is ethical? Why or why not?

Part 2 When answering these questions, please write 3 to 4 sentences on EACH topic.Give examples where appropriate. Use a minimum of two sources other than your book.Remember to cite your sources. APA format

Due to many changes in the corporate structure, and because we have instituted a new "Bring Your Own Device" policy, it is very important that we create a computer use policy for all employees to sign.This will alert them to potential ethical issues that may arise dueto the use of the company technology.Please research several computer use policies online.

You may use them as guides in development of our policy however, it is very important that you do not duplicate or copy any policy to avoid copyright infringement claims against the company

Task: Write a computer use policy.
1. Explain ethical computing
2.Explain plagiarism and copyright infringement.
a. What is the difference between the two?
b. How do you know if you are plagiarizing of violating copyright?
c. Research plagiarism and find an example of plagiarism that was in the news.
d. Explain copyleft.
3. Explain software piracy.
A. What are the penalties?
4.Sharing an Internet connection
a.Penalties
5. Explain ethical issues related to using social media.
a. Give a specific example where an employee was terminated due to actions on social media.
6. Explain an employer's legal right to review your activities using their technology. Give specific examples where the law has been upheld or applied
a. Keylogging
b. Reading emails
c. Monitoring Internet usage/sites visited

Reference no: EM13845210

Questions Cloud

Compare the umayyad caliphate and the abbasid caliphate : Compare and contrast the Umayyad caliphate and the Abbasid caliphate in regards to the following: imperial expansion and/or contraction, nature of rule, treatment of non-Muslims, and method of demise
Write short notes on citing electronic resources. : Write short notes on citing electronic resources.
Compare and contrast the toolkit used by hunter-gatherers : According to Thomas Kuhn, how does science normally progress? Compare and contrast the toolkit used by hunter-gatherers with that used by farmers
Impact of culture on human perception : 1. Explain the profound impact of culture on human perception. 2. Demonstrate appropriate language strategies in differing and multi-language speaking environments.
Cyberloafing has become a significant issue : Cyberloafing has become a significant issue to companies today. Cyberloafing costs companies millions of dollars each year. As a result, some companies have chosen to use various technologies to either prevent or catch employees that are spending ..
Explain what is hadoop : Explain what is Hadoop, how its fit into the Data Warehouse creation/utilization concept, what advantages its bring over the earlier and more traditional DW back-end technologies, and any other material on these topic that you find interesting.
Annotated bibliography assignment : A summary of the article's conclusions (please do not just copy from the article's abstract), which must be 3-5 sentences long.
International business plan : International Business Plan
Exactly what is an empire and how does it grow : Exactly what is an empire? How does it grow? What are the typical functions performed by an empire, and what are the main causes that typically lead to an empire's decline and demise

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Explain most of the various models of the shinkansen

Most of the various models of the Shinkansen, Japan's high-speed trains, travel between 240 km/h and 285 km/h. The two exceptions are the Shinkansen "0" series, which began service in 1964, and the new "500" series, which began service in 1997. Se..

  Explain a pie chart is used to display

A tool that creates a report through a series of dialog boxes on the Create tab is the, A pie chart is used to display

  Create a new table using the column structure

Create a new table using the column structure - From the l_foods table, list the description and price values of the following foods: hamburger, french fries, and soda.  Sort the rows by description.

  Differentiate between parallel and serial busses

Question1 :  One large modern computer has a 48-bit memory address register. How much memory can this computer address? Question 2 : What is the function of registers in the fetch-execute instruction cycle? What is the purpose of the instruction regi..

  Give a cfg for the set of all strings

Give a CFG for the set of all strings over {a,b} with twice as many a's as b's

  Protect proprietary interest by addressing ethical issues

Advise whether you agree or disagree with CEO, specifically addressing ethical issues involved. Suppose you make a decision to hire a hacker, how would you protect your proprietary interests?

  The initialization program

The initialization program will start with how much you have in the cash register and in what denominations the money is in.

  Flexible single master operations roles

Flexible Single Master Operations Roles

  What ports are found on the computer

What ports are found on the computer. What is the size of the monitor. Is it a touchscreen monitor

  Perform a computer forensic investigation

Is it easier to perform a computer forensic investigation if the suspect's computer is a Linux or UNIX system instead of Windows? Does the type of operating system affect the process at all? Consider all flavors of Linux/UNIX and Windows.

  Create an application predict size of population organisms

Create an application that will predict the approximate size of the population of organisms. The user should select or enter the starting number of organisms in a combo box, enter the average daily population increase(as a percentage) in a text bo..

  The lowest common ancestor

1. The lowest common ancestor. Finding of O (sqrt (N)) and O (log N) with preprocessing O (N) 2. The lowest common ancestor. Finding of O (log N) with preprocessing O (N log N) (the method of lifting the binary) 3. The lowest common ancestor. Finding..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd