Checkpoint Monitoring Employees on Networks

Checkpoint Monitoring Employees on Networks - organization...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Checkpoint: Monitoring Employees on Networks Read Monitoring Employees on Networks: Unethical or Good Business? on p. 206 of Essentials of Management Information Systems . Answer the following questions in 200 to 300 words: o How does e-mail benefit an organization? Why might an organization want to limit how an employee uses e-mail during work hours? What is an e-mail’s path once it leaves an organization? o What is the effect of instant messaging on organizational networks? What are benefits and drawbacks of using instant messaging in an organization? o What are benefits and drawbacks of Web page and search engine use in an organization? o Should managers monitor employee e-mail and Internet usage? Why or why not? The email system benefits an organization by allowing information to travel from one user to another, thus instead of walking a file to a person you can just click and send to retrieve information. An
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: organization would limit emails sent during work, would be to keep employees working and less traffic on their servers. Emails sent could be used as someone else’s idea, or could be used in legal matter. Instant messaging can lag a server, also can leak information about an organization. The benefits are professionally used to transfer information and the drawbacks are employees using up company time wasting money. Using web pages can be beneficial to stock traders and medical information, the drawback is people using the web for anything other than work. I think managers should not monitor employee internet and email usage because it is not the job requirement by my understanding. It should be monitored by human resources department that precise and detailed to monitor the usage. If it is violated the employee should be reprimanded or fired, depending on how serious the situation....
View Full Document

This note was uploaded on 06/12/2011 for the course IT 205 1 taught by Professor Managementofinformationsystems during the Spring '11 term at University of Phoenix.

Ask a homework question - tutors are online