More Subjects
[Name of Student]
[Name of Professor]
[Name of Class]
[Day Month Year]
Inappropriate Computer Use
Business Ethics in the workplace an encouraging ambiance at the workplace that leads to satisfied and happy employees. While an unethical dilemma results in leaving work early or deceitful to potential clients. In this regard, setting up an ethical policy fosters strong business ethics at a workplace that clearly spells out what is ethical and what is unethical. Such policies ensure the integrity and a clear vision that are always embodied by the higher management, and hence employees’ expectation to work will be ethical and fair.
Employees, however, may be expected to use computer inappropriately by doing non-company work at company time. This could possibly put the company and their job at risk by jeopardizing security-related concerns such as company data and workplace harassment ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"DeBNgEqR","properties":{"formattedCitation":"(Herath and Wijayanayake)","plainCitation":"(Herath and Wijayanayake)","noteIndex":0},"citationItems":[{"id":384,"uris":["http://zotero.org/users/local/orkqtrjP/items/QMNX7WRR"],"uri":["http://zotero.org/users/local/orkqtrjP/items/QMNX7WRR"],"itemData":{"id":384,"type":"webpage","title":"Computer misuse in the workplace","genre":"Text","URL":"https://www.ingentaconnect.com/content/hsp/jbcep/2009/00000003/00000003/art00010","language":"en","author":[{"family":"Herath","given":"H. M. P. S."},{"family":"Wijayanayake","given":"W. M. J. I."}],"issued":{"date-parts":[["2009",5,1]]},"accessed":{"date-parts":[["2019",4,11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Herath and Wijayanayake). Employees use a computer for performing banking transaction, shopping and accessing to their social media sites and emails ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"lSHpKN17","properties":{"formattedCitation":"(Sonny S. Ariss)","plainCitation":"(Sonny S. Ariss)","noteIndex":0},"citationItems":[{"id":386,"uris":["http://zotero.org/users/local/orkqtrjP/items/45RJDSB3"],"uri":["http://zotero.org/users/local/orkqtrjP/items/45RJDSB3"],"itemData":{"id":386,"type":"webpage","title":"Computer monitoring: benefits and pitfalls facing management - ScienceDirect","URL":"https://www.sciencedirect.com/science/article/abs/pii/S0378720601001215","author":[{"literal":"Sonny S. Ariss"}],"accessed":{"date-parts":[["2019",4,11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Sonny S. Ariss). This will eventually slow the computer processes and business could be prevented or hindered. The company, though, has both legal and moral obligations for the protection of sensitive data ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"NgM6tMnN","properties":{"formattedCitation":"(Herath and Wijayanayake)","plainCitation":"(Herath and Wijayanayake)","noteIndex":0},"citationItems":[{"id":384,"uris":["http://zotero.org/users/local/orkqtrjP/items/QMNX7WRR"],"uri":["http://zotero.org/users/local/orkqtrjP/items/QMNX7WRR"],"itemData":{"id":384,"type":"webpage","title":"Computer misuse in the workplace","genre":"Text","URL":"https://www.ingentaconnect.com/content/hsp/jbcep/2009/00000003/00000003/art00010","language":"en","author":[{"family":"Herath","given":"H. M. P. S."},{"family":"Wijayanayake","given":"W. M. J. I."}],"issued":{"date-parts":[["2009",5,1]]},"accessed":{"date-parts":[["2019",4,11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Herath and Wijayanayake). This data could be of customers, contracts or even staff personal records. In such cases, employers must have a sound business reason to suspect the employee on legal frameworks.
Therefore, the company requires to restrict access to computer drives or data by licensed software. Such companies who monitor their employees’ use of computer and the internet can have access to block specific sites. Training, on the other hand, could possibly play a vital role in dealing with ethical issues and cover all the aspects. Moreover, some business intellectual views the unethical use of computers at the workplace as a violation of the fourth amendment and this is equal to a seizure of property. Moreover, the employees lose their confidence related to privacy in the workplace.
Work Cited
ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Herath, H. M. P. S., and W. M. J. I. Wijayanayake. Computer Misuse in the Workplace. 1 May 2009, https://www.ingentaconnect.com/content/hsp/jbcep/2009/00000003/00000003/art00010.
Sonny S. Ariss. Computer Monitoring: Benefits and Pitfalls Facing Management - ScienceDirect. https://www.sciencedirect.com/science/article/abs/pii/S0378720601001215. Accessed 11 Apr. 2019.
More Subjects
Join our mailing list
@ All Rights Reserved 2023 info@freeessaywriter.net