Preview

Cyberslacking

Satisfactory Essays
Open Document
Open Document
387 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyberslacking
“Cyberslacking in the Work Place”

“A recent survey sponsored by the American Management Association and the ePolicy Institute reported that more than one-quarter of employers have fired employees for the misuse of email, and about one-third have fired employees for misusing the Internet”, stated by the authors Ivancevich, J., Konopaske R., Matteson, M., (2011)(p.229). Chapter 8 discusses different misbehaviors in the job environment. One of those misbehaviors is cyberslacking; this term is referred to employees who surf the internet, while at work for personal reasons such as: “Viewing pornographic sites and news sites, shopping, stock trading, vacation planning, gaming, chatting, in other words, engaging in general non-business Internet activities on company time and using company resources”, stated W. Block (2001)(p.33).

Cyberslacking is becoming more common in today’s work environment because employees are starting to feel comfortable. It presents new and distinctive complications for management. Companies are noticing that there is an increased internet use; well above the time that the job requires a person to be on the internet. Now that companies are becoming more innovative, employees feel the need to slack of on their job and incorporate their personal business. Employees who can carry their phones on the job tend to cyberslack on their wireless internet. A research was done by W. Block I have personally caught my manager cyberslacking roaming Facebook instead of looking up reports. Being in a management position does not justify them from following the rules well. I constantly catch my manager on her phone roaming Facebook or looking at Pinterest, while on the clock. According to W. Black (2001), “Internet usage brings security problems as well. The more web sites visited that is not necessary, the greater the exposure to viruses”, (p. 226). Since Florida is an at-will state, they can terminate an employee for any reason as long as it is not



References: Block, W (2001). Cyberslacking, Business Ethics and Managerial Economics. Journal of Business Ethics, Vol. 33, No. 3. retrieved 10/25/2013, from Article Stable URL: http://www.jstor.org.famuproxy.fcla.edu/stable/25074605

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Behaviors such as transferring files from a work device to a home computer that is not protected or maintained to IT’s standards, using personal communications that are not as safe as corporate communications, talking about sensitive company matters where others can hear the conversation, and failing to use a laptop privacy guard when working remotely in a public place all invite information theft. Employees also fail to safeguard equipment such as laptop computers and portable storage devices, which can be lost or stolen (Cisco Systems, 2008, p 5).…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    References: Morton, H. (October, 2002 10). Somerville college policy on staff use of email and internet. Retrieved from http://www.some.ox.ac.uk/cms/files/policy_on_staff_use_of_email_and_internet_Oct_02.pdf…

    • 1402 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    UNV104

    • 999 Words
    • 4 Pages

    Internet abuse is an issue in the workplace. Statistics show the internet is being used for personal use during work hours. Extensive internet use causes a decrease in productivity and an increase in liability.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Best Essays

    The Sarbanes-Oxley Act

    • 2729 Words
    • 11 Pages

    The missing of a formal acceptable use policy (AUP) did not give user or management a guideline on the day-to-day activities. The incident involving Laura requesting trial software without getting proper security review and authorization shows the lack of security awareness and proper request for exception procedure. According a report from Ernst & Young, over 75% of security breaches are caused by activities by internal users (H. M. P. S. & Wijayanayake, 2009). Misuse of computer resources in work place not only reduced productivities but also bring additional risk to company’s reputation. Activities like surfing the web and participating in social networking sites might bring questionable contents to the work place. These contents can be seen as a form of sexual harassment. The Melissa virus, founded in 1999, was originally planted in an alt.sex Usenet newsgroup message. The billions of dollars of productivity lost and the negative publicity can tarnish the image and the business of Firion. Without a formal review on software request, the IT security organization will not be able to design a security solution to cover the user base. This gap will allow both internal and external intruders to plant software or Trojan to disrupt services or stealing…

    • 2729 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    Xcom/285 Privacy Laws

    • 321 Words
    • 2 Pages

    Friedman, B., & Reed, L. (2007, June). Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use. Employee Responsibilities and Rights Journal, 19(2),…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The internet 's rapid spread and growth in popularity among the public meant that people were using it for communication and education in their everyday lives. As employees spent more time at the office, the demand to use the internet for personal use was growing. Though the official company policy was that internet usage must be for business purpose, the decision was made to step back from that policy and let employees use search and email functions for personal use. Waterbee chose to monitor employees usage, but the results after the first week were surprising. For example, one employee spent an entire day on playboy.com. This employee did not work in his own office, which meant other employees could see his monitor. The Security team, faced with taking action on a number of employees, and complicated by legal issues, then advised HR to stop monitoring usage. HR, however, stuck to the orignal plan and took action on the employees who misused the Internet.…

    • 827 Words
    • 4 Pages
    Better Essays
  • Good Essays

    In response to increasing computer use in the United States, Congress enacted the Computer Fraud and Abuse Act (CFAA) in 1984 (Booms, 2011). This Act covers a broad area of computer crimes. One in particular is, crimes of an employee against a…

    • 597 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Computer Misuse Act

    • 277 Words
    • 2 Pages

    An employee uses a company computer to send personal emails or someone gaining access to a banking computer and performing an unauthorized transfers.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    This Sample Internet Usage Policy applies to all employees of company who have access to computers and the Internet to be used in the performance of their work. Use of the Internet by employees of company is permitted and encouraged where such use supports the goals and objectives of the business. However, access to the Internet through company is a privilege and all employees must adhere to the policies concerning Computer, Email and Internet usage. Violation of these policies could result in disciplinary and/or legal action leading up to and including termination of employment. Employees may also be held personally liable for damages caused by any violations of this policy. All employees are required to acknowledge receipt and confirm that they have understood and agree to abide by the rules hereunder.…

    • 2525 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Web page and search engines are very helpful and can provide a lot of information at an employee’s fingertips, however if these programs are not monitored they can be abused by personal use of employees. Managers and other department supervisors should monitor the use of email, instant messaging, web pages, and search engines because it is important to…

    • 346 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Employee privacy has been a debate for the centuries. In the past it was how an employee conducted themselves away from the workplace because they were representatives of the company. Today in our technological world, it is all about e-mails, social networking sites, internet, voicemail, etc. Is it justified for employers to have these forms of communication monitored? Chauncey M. DePree, Jr. and Rebecca K. Jude in their article, “Who’s Reading Your Office E-mail? Is that Legal?” argue that employer’s do have the right to monitor employee’s e-mail. On the other hand a USA Today article “E-monitoring of Workers Sparks Concerns” brings up the ethical concerns of this type of monitoring. This paper will summarize both perspectives and offer an opinion on the debate.…

    • 832 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    cyber crime

    • 3167 Words
    • 13 Pages

    Facebook has become a force to reckon with in the field of social networking. It has been ranked as the number one social networking site with a membership of over five hundred million. It has earned trust from many people who have in turn exposed their information without thinking twice into which hands it might fall. Despite the positive contribution and impact that Facebook has provided, it still has a weak point that is easy to manipulate and misuse - this is the anonymity of the internet. It is hard to tell that the person you are interacting with on Facebook is whom he or she claims to be. It is also easy to hack someone’s account on Facebook and use it for personal gain and in most cases criminal activities. This has redefined cybercrime making it grow and graduate to a new level where it is difficult to differentiate between crime and genuine activities on the internet. Many crimes such as drug peddling have advanced to the level where it is hard to tell what is going on unless one understands the language that is being used by the involved parties. This study intends to establish how much cybercrime has grown as a result of social networks in general and Facebook in particular. The study also intends to enlighten the users of social networks on the existence of such crimes. Moreover, the study will strive to ascertain the number of people who fallen victim to such crimes, the consequences and how they got out of the situation. The study will be conducted using a questionnaire survey. Pertinent issues from the questionnaire survey will be pursued and clarified through probing questions posed to the interviewees. The resultant data will be analyzed using t-test, chi-square, correlation descriptive statistics and regression analysis.…

    • 3167 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Being Hacked

    • 494 Words
    • 2 Pages

    Many people are being hacked for their personal information from their devices. Social Media accounts are known to get hacked the most. Passage one explains how you shouldn't let other people know your password or email because that is one of the most easiest ways of getting hacked. Passage two explains how people tend to download apps that could possibly hack them from giving too much information. Passage three explains how important it is to keep your social security number safe because it identifies everything about you. It says how important it is to keep it safe.These three problems can easily be resolved so you wouldn't have to go through this situation.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays