This preview shows page 1. Sign up to view the full content.
Unformatted text preview: was being invaded. I would not want another employee in my company to use this software to look through my e-mails and personal documents just to determine if I am knowledgeable about certain topics. Most importantly, I would be extremely upset if someone had to use the ELS software to look through my e-mails and then concluded that they did not find me helpful enough to answer their questions. Invading my privacy by searching through my e-mails and documents would make me feel very uncomfortable because I would have no idea if they stole any of my personal information that may have been revealed within my e-mails. If this software is necessary, then they should at least notify the employees or have their permission before doing so....
View Full Document
This essay was uploaded on 04/20/2008 for the course MIS 201 taught by Professor Jain during the Spring '08 term at Salem State.
- Spring '08