Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Disadvantages of work life balance
Disadvantages of work life balance
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Disadvantages of work life balance
In today’s technologically driven society, advances have changed how employees and employers operate and do business. 10 years ago terms such as “standard” device and B.Y.O.D were unheard of. Thanks to cooperation’s such as APPLE, Research in Motion and Intel, these terms are now active in today’s workplace. By implementing “standard” devices and Bring Your Own Device (B.Y.O.D) strategies into workplace IT departments face a problem; managing mobile devices used by employees. The two suggested strategies are providing employees with “standard” devices such as a smartphone, tablet or computer provided by the company. “Standard” devices are monitored by IT departments. The downsides of “standard” devices are that companies must pay for the hardware device and cover all costs associated with that device. The second strategy is B.Y.O.D which allows employees to cover costs by bringing their own device into the workplace therefore saving the company money. Going back only a few years, B.Y.O.D was only an idea few knew about. In 2008 cooperation’s largely used “standard” devices. Today however, many “standard” devices are being phased out due to the Bring Your Own Device trend. Why? Employees want their say in the workplace. People like to be their own decision maker. Employees strive for a work-life combination. Company provided devices do not permit employees access to personal contacts or to store private information. Employees want to simultaneously work and communicate with the outside world. One advantage of “standard” devices is less, unproductive work due to social media browsing and gaming, because the activity on these devices is monitored. Cooperation’s also faced many financial barriers with both, company devices and the B.... ... middle of paper ... ...(Bring Your Own Device). Retrieved 3 30, 2014, from http://www.cio.com/article/696971/Pros_and_Cons_of_BYOD_Bring_Your_Own_Device_ INSIGHT. (2013, 7 16). Retrieved 3 30, 2014, from http://www.iamota.com/insight/brands-beware/ Levin, A. (2014, 3 19). BYOD: The Most Dangerous Acronym for a Small Business . Retrieved 3 30, 2014, from http://www.forbes.com/sites/adamlevin/2014/03/19/how-small-businesses-can-keep-byod-from-leaving-them-doa/ STAMFORD. (2013, 05 1). Newsroom. Retrieved 3 30, 2014, from http://www.gartner.com/newsroom/id/2466615 Sylvia, L. (2013, April 10). BYOD 2.0: Adressing Employee Privacy and Enterprise Security. Retrieved March 30, 2014, from http://insights.wired.com/profiles/blogs/byod-2-0-addressing-employee-privacy-and-enterprise-security#axzz2xU319aBt Wikipedia. (n.d.). Retrieved 3 30, 2014, from http://en.wikipedia.org/wiki/Bring_your_own_device
Dagar, Anil. “Internet, Economy and Privacy.” Fung Institute for Engineering Leadership. 16 April 2013. Web.
The rapid growth in technology has been impressive over the past 20 years from television graphics and multi-purpose phones to world-wide connections. Unfortunately, the government is having trouble with this growth to protect the people from having their privacy violated due to the information being stored electronically. In “The Anonymity Experiment”, by Catherine Price, states how easily a person can be track and how personal can be lost. Also, in “Social Security and ID theft”, by Felipe Sorrells, states how social security numbers and personal identities can be stolen and how the government is trying to stop that theft. They both intertwine with technology and privacy though Price's article has a broad overview of that, while Sorrells's focus is mainly on social security number and identity thief part. Price and Sorrells shows that companies are taking too much advantage from the customer, the government, even though their trying, needs to start helping the people protect their privacy, and a balance between the amount of trust people should have giving out their sensitive records to which information is protected.
Print Lazar, Wendi S. “Limitations to Workplace Privacy: Electronic Investigations and Monitoring” Computer and Internet Lawyer (2012): SIRS. Web. The Web. The Web.
Mobile is the first order priority device for access because people are connecting with others, finding entertainment, and doing business—all with smart phones. The prices of mobile phones are never over $1,000 in today’s world. They are affordable and accessible. As the result of the changes the worldwide and national business environment has undergone, people own 1-2 cell phones on average. However, the mobile markets in US seems to have been saturated.
24 Privacy Rights Clearinghouse (2002) Employee Monitoring: Is There Privacy in the Workplace? . (6/3/2004)
These technologies are of limited effectiveness in connecting employees while at work and at home via Berean network. Berean¡¦s infrastructure does not allow employees on the move to leverage the time they spend at meetings, in the cafeteria, and the other location to catch up on e-mail, retrieve information, or perform other work related activities (Sage Research Staff, 2005).
Sometimes there is no middle ground. Monitoring of employees at the workplace, either you side with the employees or you believe management owns the network and should call the shots. The purpose of this paper is to tackle whether monitoring an employee is an invasion of privacy. How new technology has made monitoring of employees by employers possible. The unfairness of computerized monitoring software used to watch employees. The employers desire to ensure that the times they are paying for to be spent in their service is indeed being spent that way. Why not to monitor employees, as well as tips on balancing privacy rights of employees at the job.
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol!
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
The privacy of all personnel information held within an employer’s database are protected and controlled by a number of federal statutes. The employee has the basic rights that protect each employee privacy so that their information is not shared without their prior knowledge or with any outside company. Moreover, employees may not like that their computer, email and/or internet use is monitored and stored with the company’s database, but the employer has the rights to know how its equipment
Powell, Robert. "Four Ways Technology Invades Your Privacy." Lovemoney.com. N.p., 5 Oct. 2011. Web. 15 Apr. 2014.
In this report, I will be addressing e-mail, Internet use, and privacy policies in my workplace; the current laws regulating employee e-mail and Internet privacy; the reasons to companies carry out e-mail and Internet use policies; the assumptions employees make about their privacy at work; and how these policies affect employee privacy at work.
On the more positive side, wireless networking allows leaders to share resources with their team operating by means of wireless media, such as microwaves, cellular technology, and radio frequencies. Wireless networking is paving the way for technology integration around the world. The use of collaboration tools allows ongoing conversations among leaders, their subordinates, board members, and community members. Professional development is one area where collaboration can have an enormous impact on management leadership. When leaders can casually share new approaches and practices with each other through a technology connection to their workplace, both leaders and their team will benefit. One way of doing this is to create an Internet mailing list where they can share questions, problems, solutions, successful techniques, and less successful techniques. The Internet is enabling digital video to achieve professional-quality and two-way interaction. This will be one of the rare cases where management leadership will be leading a technological shift in society as a whole. Hand-held devices are high-tech gadgets, now more powerful than early Windows or Macintosh machines. Handheld devices offer more versatility than full-size computers and are much more portable than the alternative personal device, the ...
Stager, G. (2014). BYOD – Worst Idea of the 21st Century? : Stager-to-Go. [online] Stager.tv. Available at: http://stager.tv/blog/?p=2397 [Accessed 27 Apr. 2014].
Staff, Proquest. At Issue: Technology and Privacy. N.p.: ProQuest LLC, 2013. Web. 5 Dec. 2013. .