DOC PREVIEW
UA AIS 347 - Hacker-Orlov-MLA-Biblio (1)

This preview shows page 1-2 out of 6 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

MLA Annotated Bibliography (Orlov)Anna OrlovProfessor WillisEnglish 1013 March XXXXOnline Monitoring: A Threat to Employee Privacy in the Wired Workplace:An Annotated BibliographyAdams, Scott. Dilbert and the Way of the Weasel. New York: Harper,2002. Print.Adams’s “Dilbert” cartoons are known for satirizingeveryday workplace issues. The cartoon on page 106 illustrateshow rampant Internet use in the workplace has become and suggests that both employers and employees are wellaware of the practice. The cartoon points out the difficultyemployers face in trying to restrict employee Internet use.American Management Association and ePolicy Institute. “2005Electronic Monitoring and Surveillance Survey.” AmericanManagement Association. Amer. Management Assn., 2005. Web. 15 Feb. 2006.According to the survey of workplace Internet use summarized in this article, employers are most concernedabout employees visiting inappropriate Web sites. However,employers’ monitoring of employees extends beyond blockingcertain Web sites. Many employers who participated in thestudy also track individual keystrokes and review e-mails. Thestudy suggests that the majority of employers who monitorInternet use are telling their employees that they are beingOrlov 1Marginal annotations indicate MLA-style formatting and effective writing.In MLA style, eachentry begins at the left margin;subsequent linesindent 1⁄2''. The annotation begins on a new line and is indented 1⁄2''.Source: Diana Hacker (Boston: Bedford/St. Martin’s, 2007).This paper has been updated to follow the style guidelines in the MLA Handbook for Writers of Research Papers,7th ed. (2009).Source: Diana Hacker (Boston: Bedford/St. Martin’s, 2007).monitored. These findings seem to contradict many of myother sources, which claim that employers are not doingenough to explain Internet monitoring to their employees.“Automatically Record Everything They Do Online! Spector Pro 5.0FAQ’s.” Netbus.org. Netbus.org, n.d. Web. 17 Feb. 2006.Spector Pro is a type of Internet surveillance program.This Web page, sponsored by the manufacturer of the product,explains the functionality of the software and describes itsfeatures. It can be installed on a variety of computers andcan be installed in “Stealth” mode so that the user cannot detect the software on his or her computer. The program canalso monitor all computer use ranging from Word documentsto Web sites. This source supports my other sources by illustrating the ease with which this kind of software can beinstalled as well as the extensive amount of information itcan gather for employers.Flynn, Nancy. “Internet Policies.” ePolicy Institute. ePolicy Inst.,n.d. Web. 15 Feb. 2006.This excerpt from Flynn’s The ePolicy Handbook offersstatistics on employee Internet use and five suggestions forminimizing it. Flynn claims that the majority of employees inthe United States are using company time to surf the Internetand that companies are suffering huge financial losses as aresult. Her suggestions for minimizing personal Internet useinclude establishing a company Internet policy and installingOrlov 2Orlov interpretsthe source’s findings in relationto other sources inthe bibliography.Annotations areusually three toseven sentenceslong.Double-spacing isused throughout,with no extra spacebetween entriesand no extra space between entriesand their annota-tions.monitoring software. This is consistent with the suggestionsof many other sources.Source: Diana Hacker (Boston: Bedford/St. Martin's, 2007).Frauenheim, Ed. “Stop Reading This Headline and Get Back toWork.” CNET News.com. CNET Networks, 11 July 2005. Web.17 Feb. 2006.The author examines the results of a study of ten thousand employees conducted by America Online andSalary.com, which found that the Internet was the most popular means of wasting time at work. Frauenheim notesthat the extra time spent surfing the Internet is costing companies an estimated $759 billion a year but also quotesthe senior vice president at Salary.com and a director at America Online, who argue that employee Internet use actually increases productivity and creativity in the workplace. Frauenheim suggests that the increase in personal Internet use at work might result from a longer average workday and that use of the Internet has made employeesmore efficient, giving them more free time to waste.Gonsalves, Chris. “Wasting Away on the Web.” eWeek.com. ZiffDavis Enterprise Holdings, 8 Aug. 2005. Web. 16 Feb. 2006.In this editorial, Gonsalves considers the implications ofseveral surveys, including one in which 61% of respondentssaid that their companies had the right to spy on them. Theauthor agrees with this majority, claiming that it’s fine if hiscompany chooses to monitor him as long as the company Orlov 3discloses its monitoring practices. He adds that he would prefer not to know the extent of the monitoring. This article,though not entirely objective, offers an employee’s perspective on Internet surveillance in the workplace. It alsoSummary is followed by a balanced evaluationof the source.Source: Diana Hacker (Boston: Bedford/St. Martin's, 2007).contradicts some of my other sources, which claim that employees want to know and should know all the details oftheir company’s monitoring procedures.Kesan, Jay P. “Cyber-Working or Cyber-Shirking? A First PrinciplesExamination of Electronic Privacy in the Workplace.” FloridaLaw Review 54.2 (2002): 289-332. Print.This extensive, balanced article examines the legal issues involved in Internet monitoring and employee privacy.Kesan establishes that US written law and common law do notguarantee a right to electronic privacy in the workplace. Hesuggests that Internet policies should be addressed through a “market-based” contractual approach that would benefit both employers and employees. Kesan examines employee concerns, such as a working parent’s desire to check on his or her children while at work, and employer concerns, such aslegal liability for inappropriate employee Internet use. Heconcludes that a company should develop an Internet policy,make that policy known to all employees, and then monitoremployees to ensure that the policy is being followed.Lane, Frederick S., III. The Naked Employee: How TechnologyIs Compromising Workplace Privacy. New York: Amer. Management Assn., 2003. Print.Lane’s book discusses the lack of employee privacy Orlov 4in the modern workplace. The author acknowledges


View Full Document

UA AIS 347 - Hacker-Orlov-MLA-Biblio (1)

Download Hacker-Orlov-MLA-Biblio (1)
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Hacker-Orlov-MLA-Biblio (1) and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Hacker-Orlov-MLA-Biblio (1) 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?