StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Employees' Access to the Internet - Essay Example

Cite this document
Summary
This discussion talks that the use of the Internet is critical for carrying out certain business tasks. Thus, the organizations cannot stop their employees from using the Internet. In fact, if they cannot trust their employees, they have problems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Employees Access to the Internet
Read Text Preview

Extract of sample "Employees' Access to the Internet"

Employees’ Access to the Internet The use of the Internet is critical for carrying out certain business tasks. Thus, the organizations cannot stop their employees from using the Internet. In fact if they cannot trust their employees, they have one of two problems: either they are employing the wrong people or they are not appropriately training the people they employ. No doubt, employees who want to do something unconstructive will discover a way and a solution, using or without using the Internet or social networks during business hours. Generally speaking, organizations have more to achieve than to lose by permitting employee access to the Internet (Ochman). It is clear from the discussion, an organization must allow its employees to use the Internet freely but it must implement strict measures to deal with security issues. According to Australia’s one of the major communications companies, Telstra, there has been a three-fold increase in Australian employers limiting the access of their workers to social network sites in the space of 10 months. In fact, throughout the same duration the total number of URLs usually permissible while working has reduced by approximately 60%. (Davidsson) gives an interesting response to the facts by saying that “organizations should not block their employee’s Internet usage, not even social networking sites.” No doubt, limiting the employee’s access to the Internet can bring in full of nasty worms and a wide variety of security threats. In view of the fact that the needs of a professional workforce can cause anger and augment valuable turnovers however, limiting the employees’ access to the Internet access can also decrease efficiency by making difficult or interrupting execution as well as completion of organizational activities. In fact, companies restricting employees’ access to the Internet specifically social networking sites will also cause a risk of preceding online networking chances, identifying critical agreements, leads and take delivery of appropriate industry news (Davidsson). In addition, (Davidsson) discusses the viewpoints of various researchers such as the research carried out by Dr Brent Coker while working at the University of Melbourne showed that employees who make use of the Internet just for enjoyment and entertainment at work within a realistic limit of approximately 20% of their total time they spent in the office are more fruitful and active by approximately 9% as compared to those who don’t have these facilities. Additionally, Coker also says that employees need to zone out for a bit to retrieve their attention. In this scenario, small and self-effacing breaks for instance a rapid surf of the Internet, allows the brain to rest itself, and as a result leading to a higher total net attentiveness for a days’ work, and consequently, greater than before output.” Certainly, companies must take care of their resources and confirm that their employees make use of the Internet for work as intended. In fact, an organization does not just permit its workers to have full Internet access, close its eyes and hope for the best. According (Davidsson), “an organization must put into practice formal policies on the use of social networking sites in the place of work and the suitable and efficient software tools that help maintain those policies” (Davidsson). Many researches show that if organizations do not stop their employees from using the Internet, employees with unlimited and unnecessary Internet access will misuse their lots of precious time and open the network to viruses, spyware and a wide variety of other security threats. On the other hand, an organization cannot just disconnect from the world. In this scenario, there is need to implement a set of rules and regulations in order to ensure effective use of the Internet. In addition, it must establish suitable use strategies, choosing and implementing security technology, and finding the way to deal with ethical and legal concerns. In view of the fact that, internet access is a certain business requirement these days thus, carefully administrating that access is vital for all businesses particularly in today's growing rigid requirements (Olsen; Davidsson). Though, the software and hardware solutions to stop, keep an eye on, or have power over employees’ Internet access have never have been enhanced, however they must be unbiased with lawful, moral, and associated employee ethical concerns. In this scenario, it is essential that an organization’s IT department learns how to walk. It is an admitted fact that people spend a lot of time using the Internet and in many cases what they are doing is completely unconnected to their working tasks. In this scenario, technical director of Layton Technology, Jose Negron, who is a developer of IT auditing and helpdesk software, discusses a latest fact by America Online and Salary.com that found that workers spend an average of two hours of working time per day while using the Internet, at an annual cost of more than $750 billion (Olsen; Davidsson). Though, output is not the only issue that organizations face by giving their employees an unlimited access to the Internet, however unverified workers are a major target for security threats such as spyware. In this scenario, Frank Cabri, who is a vice president of marketing at security solution provider FaceTime Communications, discusses the fact that spyware costs organizations more than $260 per user annually. In addition, according to his research in the past few months, spyware threats quadrupled, and that recent polls give us an idea about that two-thirds of IT managers acknowledge spyware as the top threat to their network security (Olsen; Davidsson). In addition, there is also a wide variety of software applications such as peer-to-peer file sharing, instant messaging, anonymizing and IP telephony that workers can willingly download as well as install even without asking the permission from IT department, all of which pretense security risk and some of which are extremely malicious. In fact, such applications frequently destroy network defenses by means of such methods as encryption and port agility (jumping around among open ports). In fact, workers normally do not recognize that the security of their computers is being compromised, and malicious applications can be downloaded by means of an apparently risk-free site. Moreover, unrestrained internet access also allows employees to view offensive content that can cause an antagonistic environment for other employees and increase an organization’s legal responsibility. Furthermore, huge streaming video and audio files can also put a stress on network resources (Olsen). In addition, the Internet can be used via Mobile Phones, so organizations must trust their employees. In fact, if they want to do something wrong they can do it using other ways. However, organizations must implement some strict rules and regulations to ensure the security of their business information. In this scenario, (Wallen; Olsen) suggest some of the useful solutions that can be adopted by an organization to deal with security issues: Block scoundrel image and video searches Inspect instant messaging and chatting content Using specific tools and applications to block popups and Web advertisements, which are normally riddled with adware and spyware Throttle bandwidth for streaming media Strip and put back active content, which can work without user permission or by encouraging unsuitable user act Use high level solutions to block spyware Use latest anti-virus solutions to scan files for viruses and Trojans In conclusion, the use of the Internet is essential for every kind of business. In fact, at the present almost all the business organizations use the Internet to carry out their daily tasks. In this scenario, blocking the Internet access to employees will increase the problems. However, organizations should find the ways to help their employees make effective use of the Internet. Works Cited Davidsson, Asa. The Cost of Blocking Employee Internet Usage. 04 June 2009. 12 May 2012 . Ochman, B.L. Five Reasons Why Companies Should Not Block Employee Access to Social Networks. 07 March 2010. 12 May 2012 . Olsen, J.W. How To Control Employees' Internet Use. 27 October 2005. 10 May 2012 . Wallen, Jack. Five tips for managing employee Internet access. 07 January 2011. 12 May 2012 . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Employees' Access to the Internet Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Employees' Access to the Internet Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1450844-written-assignment
(Employees' Access to the Internet Essay Example | Topics and Well Written Essays - 1250 Words)
Employees' Access to the Internet Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1450844-written-assignment.
“Employees' Access to the Internet Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1450844-written-assignment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Employees' Access to the Internet

Social Media and Employees and Employers

The lack of regulations, clear guidelines, has led to dissemination of information across the internet for a purpose other than that intended.... nbsp;… Various internet sites have emerged like MySpace and Facebook.... Its main purpose was to enhance communication among students through an easy access on online network....
6 Pages (1500 words) Article

Employee Privacy Rights in the Workplace

Employees who have access to the internet freely, so increase their productivity and efficiency, but they can also become easily distracted, which may or may not make monitoring necessary.... On the other, they must also protect against the actions of employees who download pornography or copyrighted music, send harassing e-mail, reveal company secrets, disclose personal information, sell drugs or even slack off on their job because of the time they spend surfing the internet....
3 Pages (750 words) Essay

Employee Electronic Privacy

The paper "Employee Electronic Privacy" establishes that in this scenario, it is the employer who stands to lose more by their workers' access to the internet, and hence, are justified in monitoring internet access in the workplace.... To cite an example, an employee caught looking for another position using the company's access to the internet purportedly illustrates the potential employer abuse of the system.... But this paper would establish that in this scenario, it is the employer who stands to lose more by their workers' access to the internet, and hence, are justified in monitoring internet access in the workplace....
6 Pages (1500 words) Report

A Potential Issue of the Facebook and Twitter Activities

There is a very insignificant population of people that know the use of computer and internet and yet don't use the social media websites.... People see the social media websites as an efficient,… Many people add others as friends that are not actually their friends, but still adding them as friends lets people know what is going on “Traditional social networks have expanded from a few dozen acquaintances to hundreds of friends, friends of friends, connections and followers” (Kelleher, 2009)....
5 Pages (1250 words) Research Paper

Employer Liability for Improper Computer and Internet Use by Employees

Part I of the paper… Part II provides a background of the topic, which includes the influence of computer technology and the internet in the workplace and provides a context of internet defamation law.... This part of the paper discusses the concept of negligent hiring, substantiates employer immunity and looks at cases involving liability the internet and the right to privacy.... Computers and the internet have transformed corporate practices....
22 Pages (5500 words) Thesis

Employee Use of Internet At Work: Policy Proposals

Therefore, the memo will provide policy recommendations for the vice of internet abuse to ensure that the problem can be dealt with both among junior staff and Employees' use of the internet at work may amount to the tort of negligence.... Furthermore, negligence is a possible tort if the action of the employee caused harm to the plaintiff or showed that he acted in a manner contrary to that of a reasonable man by virtue of his inappropriate use of the internet....
8 Pages (2000 words) Essay

Legal and Technological Aspects of the Idea of Workplace Privacy

This paper "The Idea of Workplace Privacy, Some of Its Legal and Technological Aspects, and an In-Depth Review of Employers and Employees Perspective" focuses on the fact that with the advent of technology, the world become a smaller place where networking has removed the personal boundaries.... nbsp;… Pedersen explains privacy regulation in a more succinct manner as, “the process of striving to maintain an optimal balance between privacy and social activity” (595)....
51 Pages (12750 words) Thesis

The Privacy in the Workplace and the Use of Technology

This paper “The Privacy in the Workplace and the Use of Technology” takes into account the major difficulty that exists between balancing the expectations of the employer and those of the employee.... In addition, the paper analyses the Australian common law and legislative protections....
18 Pages (4500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us