Cyberloafing has become a significant issue

Assignment Help Basic Computer Science
Reference no: EM13845210

Part 1

Cyberloafing has become a significant issue to companies today. Cyberloafing costs companies millions of dollars each year. As a result, some companies have chosen to use various technologies to either prevent or catch employees that are spending their time online or on their phones doing non-work related activities such as shopping, playing games, or socializing. Do some research on cyberloafing. What are the costs to companies? How much time do employees spend doing non-work related activities? What are some of the tools employers are using? What are the laws in your state related to the use of these tools? Do you think the use of these tools is ethical? Why or why not?

Part 2 When answering these questions, please write 3 to 4 sentences on EACH topic.Give examples where appropriate. Use a minimum of two sources other than your book.Remember to cite your sources. APA format

Due to many changes in the corporate structure, and because we have instituted a new "Bring Your Own Device" policy, it is very important that we create a computer use policy for all employees to sign.This will alert them to potential ethical issues that may arise dueto the use of the company technology.Please research several computer use policies online.

You may use them as guides in development of our policy however, it is very important that you do not duplicate or copy any policy to avoid copyright infringement claims against the company

Task: Write a computer use policy.
1. Explain ethical computing
2.Explain plagiarism and copyright infringement.
a. What is the difference between the two?
b. How do you know if you are plagiarizing of violating copyright?
c. Research plagiarism and find an example of plagiarism that was in the news.
d. Explain copyleft.
3. Explain software piracy.
A. What are the penalties?
4.Sharing an Internet connection
a.Penalties
5. Explain ethical issues related to using social media.
a. Give a specific example where an employee was terminated due to actions on social media.
6. Explain an employer's legal right to review your activities using their technology. Give specific examples where the law has been upheld or applied
a. Keylogging
b. Reading emails
c. Monitoring Internet usage/sites visited

Reference no: EM13845210

Questions Cloud

Compare the umayyad caliphate and the abbasid caliphate : Compare and contrast the Umayyad caliphate and the Abbasid caliphate in regards to the following: imperial expansion and/or contraction, nature of rule, treatment of non-Muslims, and method of demise
Write short notes on citing electronic resources. : Write short notes on citing electronic resources.
Compare and contrast the toolkit used by hunter-gatherers : According to Thomas Kuhn, how does science normally progress? Compare and contrast the toolkit used by hunter-gatherers with that used by farmers
Impact of culture on human perception : 1. Explain the profound impact of culture on human perception. 2. Demonstrate appropriate language strategies in differing and multi-language speaking environments.
Cyberloafing has become a significant issue : Cyberloafing has become a significant issue to companies today. Cyberloafing costs companies millions of dollars each year. As a result, some companies have chosen to use various technologies to either prevent or catch employees that are spending ..
Explain what is hadoop : Explain what is Hadoop, how its fit into the Data Warehouse creation/utilization concept, what advantages its bring over the earlier and more traditional DW back-end technologies, and any other material on these topic that you find interesting.
Annotated bibliography assignment : A summary of the article's conclusions (please do not just copy from the article's abstract), which must be 3-5 sentences long.
International business plan : International Business Plan
Exactly what is an empire and how does it grow : Exactly what is an empire? How does it grow? What are the typical functions performed by an empire, and what are the main causes that typically lead to an empire's decline and demise

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write c program test data types passed reference or by value

Part a Write a C program that tests whether or not the following data types are passed by reference or by value, and prints what it discovers out to the termina

  Simpl program prove by structural induction

Let c be an arbitrary SIMPL program and assume that judgment ßs' holds for some store s'. Prove by structural induction that x Î pre(s'), where pre(s') denotes the preimage of s'.

  An iterative algorithm to traverse an arbitrary number

An iterative algorithm to traverse an arbitrary number of nested subdirectories in a file system.

  How documents appear both on the screen and when printed

Changing options in the screen affects how documents appear both on the screen and when printed

  Specific role an information system

What is a specific role an information system can play in an organization? What are three components of this system? How do they work in the enterprise?

  Decision structures and conditionals

Discuss routine decisions you make throughout your day. How might you implement them using C# decision structures and conditionals?

  Write the program to implement your algorithm

calculate what your expected outputs should be. 5. Write the program to implement your algorithm. Test your program using your test cases.

  The goods are substitutes

(Substitutes and Complements) For each of the following pair of goods, determine whether the goods are substitutes, complements, or unrelated: Peanut butter and jelly, Private and public transportation, coke and pepsi, alarm clocks and automobiles, g..

  Show her to install and used it in my network administration

and show her to install and used it in my network admistaion class

  How much of program-s time slice can be spent waiting

Desired data to rotate around to the read/write head, how much of a program's time slice can be spent waiting for a read operation from a disk to take place?

  Convert the binary numbers to their decimal equivalents

Directions: Convert the following binary numbers to their decimal equivalents.

  Searches of textual documents and database querying

Your company has been hired to design a product that will provide searches of textual documents and database querying. Your design team has not developed a product like this before

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd