Hacker-Orlov-MLA - MLA Research Paper (Orlov) Orlov 1 Anna...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
MLA Research Paper (Orlov) Anna Orlov Professor Willis English 101 17 March XXXX Online Monitoring: A Threat to Employee Privacy in the Wired Workplace As the Internet has become an integral tool of businesses, company policies on Internet usage have become as common as policies regarding vacation days or sexual harassment. A 2005 study by the American Management Association and ePolicy Institute found that 76% of companies monitor employees’ use of the Web, and the number of companies that block employees’ access to certain Web sites has increased 27% since 2001 (1). Unlike other company rules, however, Internet usage policies often include language authorizing companies to secretly monitor their employees, a practice that raises questions about rights in the workplace. Although companies often have legitimate concerns that lead them to monitor employees’ Internet usage from expen sive security breaches to reduced productivity the benefits of electronic surveillance are outweighed by its costs to employees’ privacy and autonomy. While surveillance of employees is not a new phenomenon, electronic surveillance allows employers to monitor workers with unprecedented efficiency. In his book The Naked Employee , Frederick Lane describes offline ways in which employers have been permitted to intrude on employees’ privacy for decades, such as drug testing, background checks, psychological exams, lie detector Orlov 1 Title is centered. Opening sentences provide background for thesis. Marginal annotations indicate MLA-style formatting and effective writing . Thesis asserts Orlov’s main point. Summary and long quotation are introduced with a signal phrase naming the author. Source: Diana Hacker (Boston: Bedford/St. Martin’s, 2007 ). This paper has been updated to follow the style guidelines in the MLA Handbook for Writers of Research Papers, 7th ed. (200 9 ).
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Source: Diana Hacker (Boston: Bedford/St. Martin’s, 2007). tests, and in-store video surveillance. The difference, Lane argues, between these old methods of data gathering and electronic surveillance involves quantity: Technology makes it possible for employers to gather enormous amounts of data about employees, often far beyond what is necessary to satisfy safety or productivity concerns. And the trends that drive technology faster, smaller, cheaper make it possible for larger and larger numbers of employers to gather ever-greater amounts of personal data. (3-4) Lane points out that employers can collect data whenever employees use their computers for example, when they send e-mail, surf the Web, or even arrive at or depart from their workstations. Another key difference between traditional surveillance and electronic surveillance is that employers can monitor workers’ computer use secretly. One popular monitoring method is keystroke logging, which is done by means of an undetectable program on employees’ computers. The Web site of a vendor for Spector Pro, a
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 8

Hacker-Orlov-MLA - MLA Research Paper (Orlov) Orlov 1 Anna...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online