Preview

Hammer Wines Business Report

Good Essays
Open Document
Open Document
966 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hammer Wines Business Report
Hammer Wines P/L
Business Analysis Report

Table of Contents

Introduction
Colin Hammer, after arranging an independent review, has found that many of his employees have been avoiding work and other responsibilities by searching the Internet for non-work related amusements. This act is known as cyber slacking and it is said to cost companies billions of dollars each year and often results in managers blocking or limiting access to certain websites.
Concerned for productivity, this report will outline the current usage and array of sites potentially being used by the Hammer Wines employees. The sites include those for entertainment or work purposes, and restrictions based on these findings should be implemented. These restrictions must be forever changing and expanding, as each website has a different effect on the varying departments its respective employees. These modifications will also affect the productivity of Hammer Wines and will be discussed in the report by making an “internet use” policy.
Findings
Department Spending Most Time on the Internet
Cyberslacking is a prominent occurrence amongst the Hammer Wines employees. However, of all employees, the Receptionists spent the longest time on the Internet throughout the one-week trial (see figure 1.0 below). This may or may not be detrimental to Hammer Wines. Often, receptionists complete their work before their set time, meaning that if they’re browsing the Internet, still answering their phone and have completed required work, productivity will remain normal. Studies also show productivity can increase when employees are less restricted with the Internet. This productivity can swing both ways. Negative productivity will be detrimental to Hammer Wines if the receptionist fails to multitask and therefore ineffectively completes required jobs.

Internet Productivity and Cyberslacking
From the array of websites (see figure 1.1 below) it is difficult to tell if Cyberslacking is

You May Also Find These Documents Helpful

  • Good Essays

    In the book Dude,You’re a Fag, C.J. Pascoe attempts to explain the complex notions surrounding gender and sexuality through her analysis of the social dynamics present at River High School. C.J Pascoe prefaces the first chapter with a description of the Mr. Cougar ceremony: a series of actions performed by students which is concluded by a male winner. The series of events which encapsulate Mr. Cougar illustrate the traditional norms of masculinity and femininity by setting criteria that men or women must meet. For men, this means possessing physical strength, rejecting homosexuality and courting women. Contrarily, women must be passive and subject themselves to the actions of man (Pascoe 1).…

    • 353 Words
    • 2 Pages
    Good Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    UNV104

    • 999 Words
    • 4 Pages

    Internet abuse is an issue in the workplace. Statistics show the internet is being used for personal use during work hours. Extensive internet use causes a decrease in productivity and an increase in liability.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Web page and search engines are very helpful and can provide a lot of information at an employee’s fingertips, however if these programs are not monitored they can be abused by personal use of employees. Managers and other department supervisors should monitor the use of email, instant messaging, web pages, and search engines because it is important to…

    • 346 Words
    • 2 Pages
    Good Essays
  • Good Essays

    These technological advancements are often very overwhelming and major sources of distraction. For example, Source G is a political cartoon created by Paul Noth that portrays a man in a lab coat at a desktop with a tab open that says “The Internet wants to destroy your productivity” with a button underneath labeled “always allow” This cartoon helps to highlight how the exponential freedom the internet provides can easily lead us to get distracted and stray away from…

    • 527 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Websites can be created by anyone with access to a computer and internet [1] and are subject too misleading or incorrect information whether accidentally or maliciously [2]. There are over 70…

    • 2377 Words
    • 10 Pages
    Best Essays
  • Better Essays

    The internet 's rapid spread and growth in popularity among the public meant that people were using it for communication and education in their everyday lives. As employees spent more time at the office, the demand to use the internet for personal use was growing. Though the official company policy was that internet usage must be for business purpose, the decision was made to step back from that policy and let employees use search and email functions for personal use. Waterbee chose to monitor employees usage, but the results after the first week were surprising. For example, one employee spent an entire day on playboy.com. This employee did not work in his own office, which meant other employees could see his monitor. The Security team, faced with taking action on a number of employees, and complicated by legal issues, then advised HR to stop monitoring usage. HR, however, stuck to the orignal plan and took action on the employees who misused the Internet.…

    • 827 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    West

    • 292 Words
    • 1 Page

    The mythology and tales of the American West circles around many folktales like cowboys, Indians, wild animals, outlaws, and stagecoaches.…

    • 292 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    This article informs us the readers on how and what forms an employer can monitor our internet usage while at work. The main reason that we see this at work is due to our advance technology at the work place. Almost all companies have access to the internet at work which entices the workers to go to websites that are not work related. This article does not debate whether it is legal or illegal. It provides information on the two basic types that employers use to monitor, internet and desktop surveillance. This article explains that they use spyware like hackers do to monitor an employee’s internet usage, website visits, emails sent, information on emails, and streaming videos. This information provides specific work or unrelated work this employee is conducting to include the time spent.…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cyber crimes here in the United States are becoming very dangerous and serious, this could include online scams, also here in the United States we are the highest target for cyber crimes. And sometimes, it is very hard to measure the extent of cyber-crime in the US, due to the fact that when authorities record cyber-crime, they don't necessarily record it as a computer-related offense. It is most often recorded as fraud or some other conventional crime. The people who hack alone cost the US billions of dollars every year.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Good Essays

    According to Cassim, “Cyber Terrorism is defined as a premeditated use of disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in the furtherance of such objectives” (p384). Cyber space is considered the best place for criminals and their peers to gather and discuss their next move (Cassim2012). With technology on the rise, the web has become the prime place for fights to break out, but not all cyber threats are necessarily terrorism…

    • 2227 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Having a ‘C’ grade is desperately below acceptable standards and needs to be rectified in order to maximize positioning potential.…

    • 1116 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The subject of wasting time on the internet has been covered intensively by the world press over the past decade. Many an afternoon has been enjoyed by a family, bonding over the discussion of wasting time on the internet. Cited by many as the single most important influence on post modern micro eco compartmentalism, it is impossible to overestimate its impact on modern thought. It is estimated that that wasting time on the internet is thought about eight times every day by the upper echelons of progressive service sector organisations, many of whom blame the influence of television. Complex though it is I shall now attempt to provide an exaustive report on wasting time on the internet and its numerous 'industries'.…

    • 520 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Misuse of Internet

    • 1778 Words
    • 8 Pages

    * 4. 60 million Americans have e-mail and/or Internet access at work. 70% of workers admitted to viewing or sending sexually explicit e-mail at work. Most traffic to Internet pornographic sites occurs during regular business hours (faster connection). Worker admits to squandering away 2.09 hours per 8-hour workday. 60% of employees admit having exchanged e-mail that could be considered racist, sexist or otherwise “politically incorrect. Managing Internet Misuse USA Internet Misuse - Information…

    • 1778 Words
    • 8 Pages
    Powerful Essays