Whose Computer Is It Anyway Term Paper

¶ … Computer Is it Anyway? Should full personal use of Internet access be allowed?

The use of computers and access to the Internet are privileges that are widely open for employees in many companies nowadays. However, abuse to the use of email and the Internet often causes problems in a workplace. One problem that full personal use of these technological privileges is that employees are tempted to make use of office and work hours for personal activities. Instead of becoming productive and serving the purpose of their job in their company, they make use of their time on activities that are out of their company's concern. Literally, such abusive employees are paid by their companies for nothing. Granting full personal use of emails and Internet access to employees has both advantages and disadvantages. The decision of granting this access to employees depends on the amount of tolerance that a company allows...

...

The former, however, can provide more activities to users. This includes net surfing for information and even online business.
Should employees be allowed to access the Internet for personal use if they use their own private e-mail accounts?

One reason why employees favor Internet access is that it can serve as a useful short time break from stressful works. As long as there is no abuse in the use of Internet, access must be allowed to employees. However, even though employees use their own private email accounts, but if they use it for malicious activities, Internet access must…

Cite this Document:

"Whose Computer Is It Anyway" (2005, January 04) Retrieved May 4, 2024, from
https://www.paperdue.com/essay/whose-computer-is-it-anyway-60696

"Whose Computer Is It Anyway" 04 January 2005. Web.4 May. 2024. <
https://www.paperdue.com/essay/whose-computer-is-it-anyway-60696>

"Whose Computer Is It Anyway", 04 January 2005, Accessed.4 May. 2024,
https://www.paperdue.com/essay/whose-computer-is-it-anyway-60696

Related Documents
Computers and the Internet
PAGES 5 WORDS 1343

Computers and the Internet The Naked Mind When Roszak refers to the "naked mind," he means to speak about the capacity and ability of the human mind as compared to the capabilities that the computer machines can do. According to Roszak, how the human mind works has vital differences from how computers process information. Roszak praises the human mind because according to him, the human mind is more dynamic and more independent

Nurse Practice Specialties The objective of this study is to locate four evidence-based research articles in nursing peer-reviewed journal. Specialty nursing includes various areas of nursing practice, which are examined in this study. Articles reviewed in this study include those related to emerging specialties and opportunities for nurses, Advanced Practice Registered Nursing, Nurse Practitioner Primary Care in Competencies in Specialty Areas, and the Specialty Practice of Nursing Informatics. The first article

Information Technology In the case of input data to computers of any type, let us remember that a computer is just a machine and depends on the instructions given to it by the individuals who have programmed the machine. The programmers try to put in solutions in the operating programs for every sort of problems that can be done by the material input to the computer for processing. This is in

In this case, the authors say not much is understood in terms "…of how it support for knowledge management practices in organizations affects the development of TMS (transactive memory system) (Choi, et al., p. 855). In this research, the trio of researchers have come up with several interesting findings relative to the impact of information technology. Indeed, after researching 139 technology teams (743 individuals) in South Korea, they learned that:

Elimination of Debit Cards
PAGES 30 WORDS 8384

Cell Phone as an Electronic Wallet Rapid advances in technology in recent decades have brought about a dramatic change in the way people work, transact and communicate. Yet, it is widely believed that there is still ample scope for technology to make life even more convenient and efficient. For instance, the cell phone is already showing the promise of functioning as an electronic wallet. It is the purpose of this

Com industry crash after the boom This is a paper examining some of the factors that caused the dot-com crash Many believe the root cause of the dot-com crash was over valuation of stock prices relative to the actual underlying value of the companies themselves. Stocks of Internet companies traded at Price-Earning ratios of higher then 30, buoyed by a speculative bubble. When reality set in for investors many realized that