22 Federal And State Law Enforcements Role To Enforce Computer-Based Crime Term Paper

PAGES
3
WORDS
1162
Cite

Law Enforcement and Computer-Based Crime Before beginning any discussion regarding the consequences of employee monitoring, it is crucial to first develop a working knowledge of precisely what this blanket term actually entails. Simply put, employee monitoring is deliberate surveillance by an employer which is used to track various behaviors, such as a worker's visitation rate to certain websites, as well as to transcribe and archive written correspondence in the form of emails while continuously observing their actions. It is the responsibility of each employer to decide where their business will lie within the gamut of employee monitoring philosophies, with many companies simply banning visitation of "cyberloafing" sites such as Twitter and Facebook while others methodically scan and document each touch of a workplace keyboard. While there are literally hundreds of types of employee monitoring available to businesses, from transparent voluntary programs to the most invasive reconnaissance campaigns, almost all major American corporations elect to make use of the practice in one manner or another. The majority of scientific study as to the efficacy of employee monitoring suggests that companies have long been disposed to track the behavior of those in their employ, and "a 1996 survey by the Society for Human Resource Management found that 36% of responding companies searched employee messages regularly and 70% said employers should reserve the right to do so" (Schulman 1998). The overwhelming expression of support for recording employee's emails and private messages, given as it was during the infancy of the online age, was a telling prelude to the mounting legal and ethical uproar which has embroiled the corporate world regarding its use of employee monitoring.

Judging merely by the level of rancor which has surrounded the employee monitoring debate in this country, it is evident that the practice arouses strong...

...

Recently concluded research of employee monitoring conducted by business ethicists Kirsten Martin and R. Edward Freeman concludes that "each advocate has its own rationale for or against employee monitoring whether it be economic, legal, or ethical," before concluding, "no matter what the form of reasoning, seven key arguments emerge from the pool of analysis" (Martin and Freeman, 2003). The scholars determined that there are seven main areas of dispute concerning employee monitoring which they term the privacy, productivity, security, creativity, liability, paternalism and social control arguments. Serious study of the effects that these seven components have on employers and workers is the only to properly ascertain the necessary role of employee monitoring while also assessing its worth to an ever adapting corporate structure.
The matter of productivity lies at the center of most employee monitoring debates, simply because most employers consistently assert that use of the internet and communication with peers via social networking serve as a constant source of disruption, often resulting in a mutual decrease in productivity and office efficiency. Advocates of employee monitoring base their support on statistical evidence like that compiled by internet research firm WebSense, whose polling found that "in 2001, 60.7% of employees surveyed said they visit Web sites or surf for personal use at work" (Martin and Freeman, 2003), to bolster assertions that tracking employee behavior is indispensable. The term cyberloafing has even been added to the American vocabulary, describing "the act of employees using their companies' Internet access for personal purposes during work hours" (Lim, 2002). Employee monitoring systems devised to eliminate internet abuse by workers inherently involve the restriction of an employee's access to only screened and approved websites, or even…

Sources Used in Documents:

References

Karlin, R. (2011, September 16). Gps used to track fired state worker raises privacy issue. The Times Union. Retrieved from http://www.timesunion.com/local/article/GPS-used-to-track-fired-state-worker-raises-2172601.php

Lim, E.G. Vivien, (2002). The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior. 23, 675-694. Wiley InterScience (www.interscience.wiley.com). Received: 26 February 2001; Revised: 30 April 2002; Accepted: 2 May 2002

Martin, K., & Freeman, R.E. (2003). Some problems with employee monitoring. Journal of Business Ethics, 43, 353-61. Retrieved from http://faculty.cua.edu/martink/JBEEmployeeMonitoring.pdf

Schulman, M. (1998). Littlebrother is watching you . Issues in Ethics, 9(2), 17-24. Retrieved from http://www.scu.edu/ethics/publications/iie/v9n2/brother.html


Cite this Document:

"22 Federal And State Law Enforcements Role To Enforce Computer-Based Crime" (2011, October 12) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/22-federal-and-state-law-enforcements-role-116874

"22 Federal And State Law Enforcements Role To Enforce Computer-Based Crime" 12 October 2011. Web.20 April. 2024. <
https://www.paperdue.com/essay/22-federal-and-state-law-enforcements-role-116874>

"22 Federal And State Law Enforcements Role To Enforce Computer-Based Crime", 12 October 2011, Accessed.20 April. 2024,
https://www.paperdue.com/essay/22-federal-and-state-law-enforcements-role-116874

Related Documents

Metrics, Implementation, and Enforcement (Security Governance) How can you determine whether there has been a malware outbreak? The threat situation today has become more dangerous than in the past. Security and safety threats have been increasing in an alarming rate; there are more than 70,000 brand new bits of malware recognized daily. Well-funded cybercriminals have been currently making advanced malware that has been made to bypass present security options by launching prior

protect the privacy of the individual via EU Directive for Protection of Personal Data The internet revolutionized the human life as we know it. It established a culture of liberty aided by not just ingenuousness but also standardized protocols. This was achieved by transmitting the essential products for business-related growth, adopting a model of governance with no formal existence of regulations along with free availability of abundant software packages. This

Government Since gang-related crimes fall within the jurisdiction of state, this research will give an insight on the need to find solutions that increasingly include all levels of government. Congress needs to pass legislation that will change immigration enforcement laws and make more aliens deportable. In addition, the federal government should take a more active participation in helping local and state jurisdictions develop anti-gang responses. The local, state and federal governments

16). Since that time, however, the U.S. society has taken a much more liberal viewpoint, with many of its citizens decrying an invasion of privacy when being questioned by law enforcement officials. This outcry is being heeded by law enforcement officials and immigrants throughout society. Many officials are now reluctant to apprehend individuals based solely upon their looks or something as flimsy as 'reasonable suspicion'. Discovering that those they apprehend

Carla Murray Timothy Broyles The number of online security breaches is increasing day by day. For instance, with the Sony Playstation data breaches to millions of small breaches; something must be done to protect the online security of citizens as well as our own government (Sony Playstation System Hacking). The question then becomes who is going to do it? Can the American citizens trust the United States government to ensure their security

In either case, privacy issues were known to be much more complicated than mere issues of personal secrecy. In fact, as Richard Posner suggested more than 20 years ago, there is a fundamental economics of personal privacy -- an economics that is in large part responsible for, and untiringly organic to, our Constitution. It is feasible, therefore, that there are rudimentary, biological, economic bases at the very roots of humankind's