Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Companies Monitoring Employees Computer Usage - Essay Example

Comments (0) Cite this document
According to Anandarajan and Simmers, "Most large organizations that are providing internet access to their employees are also providing some means to monitor and control that usage" (142). It is not uncommon to find employees surfing the internet particularly using the social…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Companies Monitoring Employees Computer Usage
Read Text Preview

Extract of sample "Companies Monitoring Employees Computer Usage"

Companies Monitoring Employees Computer Usage According to Anandarajan and Simmers, "Most large organizations that are providing internet access to their employees are also providing some means to monitor and control that usage" (142). It is not uncommon to find employees surfing the internet particularly using the social media during company time. It is important to note that the main objective of technology in the workplace is to increase productivity through enhancing efficiency (Anandarajan and Simmers 143). However, if technology is misused, productivity can negatively be affected. To prevent incidences of employees misusing company time surfing the internet, action plans have been introduced in many organizations to help identify employees involved in such activities. For instance, some sniffers on computer usage can show all the key strokes a person has made on a company computer. This can act as the basis for firing employees found to have a habit of misusing company time surfing the internet.
Other than reasons pertaining to productivity, there are also other reasons why organizations monitor and control internet usage. A good example includes legal liabilities that may arise due to misuse of technology (Anandarajan and Simmers 144). For instance, an employee may use the company internet to download and distribute pornographic materials. If such materials falls into the wrong hands, the company could be sued for casualness. Sending pornographic materials to colleagues in the workplace could also be considered sexual molestation and the company could also be liable if necessary steps are not taken to address the problem (Anandarajan and Simmers 144). In a nutshell, monitoring and controlling internet usage in the workplace increase productivity and minimizes the likelihood of paying for legal damages.
Work cited
Anandarajan, Murugan, and Simmers Claire. Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management. London: Information Science Publishing, 2004. Print. Read More
Cite this document
  • APA
  • MLA
(“Companies Monitoring Employees Computer Usage Essay”, n.d.)
Companies Monitoring Employees Computer Usage Essay. Retrieved from
(Companies Monitoring Employees Computer Usage Essay)
Companies Monitoring Employees Computer Usage Essay.
“Companies Monitoring Employees Computer Usage Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Companies Monitoring Employees Computer Usage

How Companies Motivate Employees Through Different Incentives

AUDIENCE: The audience for this report is any business owner or manager who is looking to motivate their employees to be more creative or more productive. I. Opening Brain drain and employee apathy are two large obstacles to optimum productivity. This becomes an inevitable part of any corporate lifestyle due to the process of completing mundane activities. In order to combat this within employees, companies regularly provide incentivized programs to invigorate productivity within employers. Various subjects that are key to increasing productivity include but are not limited to bonuses, benefits, increased commission, and even the environment (Sheffrin, 2003). Companies regularly promote competition between employees as a means of...
10 Pages (2500 words) Research Paper

Employees' Internet Usage in Workplace: To Monitor or not to

(Murugan, 2004) A decision can however be reached based on certain factors. Most people responsible for making the decision such as managers would analyze the cost associated with the computer surveillance against the financial loss of wasted time before making a decision on whether or not to monitor employee’s internet usage at work. Ignoring the ethical part of the issue, most employers choose to monitor their employee considering the fact that the time wasted by the employees for personal interest at the organizations expense is far much of a loss of which they feel a strong need to contain. Other employers choose not to monitor their employees’ internet usage not based on ethics but on the necessity to cut back on their techn...
4 Pages (1000 words) Essay

Drug Usage

...? Drug Usage of the of the Drug Usage Industry and drug usage Drug usage has been a serious concern amongst people belonging to different fields of life especially for working professionals. Drug usage significantly affects their health and affects the quality of work they put in at work. They fail to concentrate on their work and are also found absent from work. This problem is a serious concern for offshore companies who are pretty much concerned with the performance of the employees of companies working under them. They try to assess the usage of drugs among employees, so they can rectify the problem. Marconova is also one such offshore company that is concerned about the health and drug usage among employees of Heerema Marine...
2 Pages (500 words) Article

Criminal Profiling And Remote Monitoring Of A Computer

... are: Remote Pass Access, Easy Remote Access, Sniper Spy, NTSClient and many more. The NTSClient software sends the current screenshot of the computer to a different computer and thus, a thorough check can be kept on anyone. This is widely used in offices, to keep a check on the employees. (Mary Smott, 2012). Bibliography Free Remote Monitoring Tool Downloads - Remote Monitoring Tool Software. [online] Download Solutions – Software Informer. Available at: Monitoring-Tool/> [Accessed October 13, 2012] LaMagna, Richard C. , and Marc Berejk. Remote Computer Monitoring: Managing Sex Offenders’ Access to the Internet. [online] Remote Computer Monitoring. Available at:
4 Pages (1000 words) Essay

Introductory Computer Usage 1

...Shaantanu Purab 05 October 2009 Introductory Computer Usage My Computer Information CPU Intel Core 2 CPU, 6320 86 GHz, Speed 87 GHz, RAM: 0.99 GB of RAM, Operating System: Microsoft Windows XP Professional Version 2002 (Service Pack 3) 2) Word Art Graphics a) b) 3. Network Security a) Anti-Virus for Windows - Trend Antivirus Office Suite - Open Office Version 3.1.0 Software Express does have some software's for Mac OS like web browsers, email, office suites, etc. but you need to log into the university with registered user id and password. Linux comes with the software's included with the OS CD as they are all under Open License Agreement. b) Port 21 - FTP Stealth - Means Secured c) Ophcrack - Recovers password in 40 seconds...
3 Pages (750 words) Essay

Employees should have an expectation of a right to privacy in the workplace, e.g. electronic monitoring of computer usage, phone calls, video surveillance should be eliminated or restricted

... the use of computer systems by employees since some actions by the employees may be detrimental to an organization’s image. For instance if an employee shares pornographic material with a colleague using a company’s computer the company may be liable to lawsuit by its clients (Howard, 2006). Irresponsible use of emails may lead to spreading or viruses and worms that could cost a company a fortune to clean. However, Weckert (2005) noted that if employees’ every single step on the computer is monitored, they develop a sense of being powerless and lose morale for work. Call monitoring involves the employer or a designated authority listening to live phone calls made or received by the employees and recording observations. While this may...
5 Pages (1250 words) Research Proposal

Introductory Computer Usage 1

The other fact of the matter is that people are rarely aware of the technological advancements and their security concerns. Although IEEE has launched WPA and then WPA2 as the new security protocols, people seldom use them. WPA2 has proved hardest to be cracked, still old algorithms are preferred over it. The table shows the percentage of the people (taken from survey by Deloitte, India) who use secure and insecure wireless medium.
Besides, if the new technology gets implemented, it slows down system performance. Internet is full of ways to teach anyone sniffing techniques and the new tools of Microsoft and Linux which are available on internet without any charge facilitates it. Many of such problems occur due to inappropriate...
4 Pages (1000 words) Essay

Monitoring Employees on Networks

If an employer uses e-mail for personal matters during working hours it will obviously affect the work performance of the individual and eventually the whole workforce. Therefore the company should have a clear policy regarding the use of e-mail to limit how employees use the e-mail.

Organizations must be cautious about the employees’ use of e-mail because it might cause confidential matters to be disclosed to the public or competitors. An employ after leaving the organization can misuse the facility for spoiling the reputation of the company.

What is the effect of instant messaging on organizational networks? What are the benefits and drawbacks of instant messaging in an organization?
1 Pages (250 words) Assignment

Dictionary usage

... Dictionary Usage The word banshee is a feminine spirit of legend whose howling signifies that a loved one is about to die. Interlude means a prevailing period. The term infernal refers to something that pertains to hell. Interminable refers to something appearing to have no end. Meditative is word that is indicative of meditation. The term phoenix refers to a legendary bird that burns, and then grows from its ashes. Haughtiness refers to arrogance. Bough refers to a main branch of a tree. Transcendent refers to going beyond normal limits. Token refers to a sign or symbol. The banshee comes from the Irish bean si, which is term used to refer to woman of the sighe or simply put, woman of the “fairly mounds” is female spirit in Irish...
1 Pages (250 words) Assignment


... Monitoring of Internet Usage The privacy of data has been a trending concern in today’s society. Employershave put in place measures that monitor the usage of computers by their employees. Some employers monitor the internet sites accessed by the employees in the course of working. In the recruitment process, the employer must inform the employee on the company’s online privacy policy. If the employer does not communicate such policies to the employee, then they have no right to monitor the internet usage of the employees. However, in most states, employers do not have an obligation by law to disclose whether they monitor the employee internet usage (Lawinfo). It may be legal for an employee to make negative comments about...
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Companies Monitoring Employees Computer Usage for FREE!

Contact Us