Preview

Ethical Theory on Cyberslacking Affect on It Industry

Powerful Essays
Open Document
Open Document
1389 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethical Theory on Cyberslacking Affect on It Industry
Rights-based ethical theory (Social contract) On Cyberslacking affect on IT industry

Cyberslacking a term used to describe employees who surf the net for their personal use such as writing e-mail or indulging in other internet-related activities at work that are not related to their jobs. These activities are performed during periods of time when they are being paid by their employer. The individual who perform such work is known as Cyberslacker while the whole act is called Cyberslacking. In contrast Robert Nozick (1974) state that “Rights-based ethical theory assumes that individuals have certain entitlements that should be respected such as freedom of speech, the right of privacy, and due process”. It describes about developing a moral system that identifies the right of others and behaves accordingly to that rights.

As high speed internet is basic requirements for the IT industry for their development, some employee may be misusing the facility for their personal purpose stating that they are doing multitasking. Workers in company spending time on internet for the personal use sending emails, surfing internet, shopping online are the common issue faced by today’s IT industry . As e-mail and high-speed Internet access have become standard-issue office equipment, uncontrolled abuse of computers in the workplace is affecting the productivity. For company, Cyberslacking is becoming a distributive and a complex problem in the IT industry. Different type of employee can prosecute in Cyberslacking, it is usually shows that employees in lower positions in the organisation with access of internet and their higher status colleagues, such as manager, are the main offenders. I strongly believe that most of the company get strongly affected by Cyberslacking. The time employees misuse the resources, but for which they are paid, as well as the company paying the internet charges and electricity bills and equipment are properly considered objects

You May Also Find These Documents Helpful

  • Good Essays

    UNV104

    • 999 Words
    • 4 Pages

    Internet abuse is an issue in the workplace. Statistics show the internet is being used for personal use during work hours. Extensive internet use causes a decrease in productivity and an increase in liability.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cyberslacking

    • 387 Words
    • 2 Pages

    “A recent survey sponsored by the American Management Association and the ePolicy Institute reported that more than one-quarter of employers have fired employees for the misuse of email, and about one-third have fired employees for misusing the Internet”, stated by the authors Ivancevich, J., Konopaske R., Matteson, M., (2011)(p.229). Chapter 8 discusses different misbehaviors in the job environment. One of those misbehaviors is cyberslacking; this term is referred to employees who surf the internet, while at work for personal reasons such as: “Viewing pornographic sites and news sites, shopping, stock trading, vacation planning, gaming, chatting, in other words, engaging in general non-business Internet activities on company time and using company resources”, stated W. Block (2001)(p.33).…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The twenty-first century is in full swing and technology changes almost daily. This increase in technology, however, is a double-edged sword for many employers. New computer and internet capabilities allow for faster production, more efficient order processing, online banking, computerized record keeping and even allows employees to work from virtually anywhere with smart phones, mobile hot spots, and wireless internet. At the same time, new ways of working require employees to have computers and internet access at work. Now employers are concerned with internet abuse and they are finding themselves in the highly controversial position of wanting to monitor internet use. There are three reasons why employers should monitor internet use: cyberslacking, legal liability issues, and bandwidth costs.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Slacking

    • 287 Words
    • 2 Pages

    Whether it is called cyber slacking, computer gold-bricking, cyberloafing, or any of the other dozens of nicknames that have surfaced over the last decade, surfing the web for personal use during work time is a world-wide problem. It is so common these days that many people won’t think twice about surfing the web for personal use, but according to the International Association for Computer Information Systems (2009), cyber slacking costs American businesses $54 billion and 30-40% of productivity losses every year.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Computers and telecommunication networks have become a substantial aspect of our society and subsequently our lives. This type of technology can be used to carry out unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. The Internet cuts all racial, social, gender, and religious…

    • 4210 Words
    • 17 Pages
    Better Essays
  • Good Essays

    Business Computing

    • 828 Words
    • 3 Pages

    Colin Hammer, of Hammer Wines has asked us to analyse the internet usage of his employees at Hammers Wines. After analysing the internet usage data himself he has considered an internet restriction at his office where staff members are only able to access certain websites, currently the only internet access restriction is for pornographic websites. Colin’s thoughts are that if the staff members are using the internet for other proposes and “cyberslacking” would decrease the employee productivity in the workplace, after submitting a proposal to his employees about the ‘internet usage ban’ Hammer Wine employees have criticised his proposal indicating that this ban would lower staff morale and chances of decreasing productivity more than it should have. Since Colin Hammer’s ideas weren’t as successful he has asked us to analysis his company internet usage data to provide ideas for a better policy to be implemented.…

    • 828 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Employers want to limit an employee’s use of e mails or internet usage during work hours for the following reasons; employee productivity, and network safety. If an employee is using e mail or the internet for his or her own personal use rather than business use, it is costing the company the loss of potential revenue. The amount of traffic on a company's network could risk the network's safety and also cause the server to become clogged with personal business rather than business use. If the network safety of secure business information becomes compromised it may cost the business money in lawsuits and bad publicity.…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    From the macro/micro perspective, the world of the electron, despite its extraordinarily minuscule size, is the foundation of society. Computers have not only brought us electronic shopping, email, and online banking, but now control our cars, how we board a plane, our MP3 players, and almost every other aspect of our lives. With any great advancement in civilization, there are always those souls who seek to capitalize on the misfortune of others by finding some way to exploit a weakness in the newest technology available; the computer industry is no exception. With the thousands of Gigabytes of data stored on our home computers, from tax information to social security numbers and banking information, it was only a matter of time before someone came along with the idea of gaining access to all of our personal information and using it against us: the cyber-criminal was born. In 1990s, when evidence of computer criminal activity began to surface, the popular U.S. news media, degenerating into their current non-journalistic preferred writing style, came up with a name for this cyber-criminal that would ‘strike fear in the hearts and minds’ of the populace. They wanted to make their stories more interesting and sell more newspapers. Instead of using the industry-acknowledged correct term for someone who illegally breaks into a computer system with malicious intent, a cracker, the popular media decided the then neutral word, hacker, was a better descriptor for the cyber-criminal.…

    • 2572 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Internet Usage at Work

    • 1782 Words
    • 8 Pages

    The widespread use of the Internet and e-mail has transformed the way business is controlled in the typical American workplace. Written communication to almost anyone in the world now can be completed nearly instantaneously. Information about any subject encountered in a daily job task can be retrieved in seconds from the Internet through multiple search engines. These technological developments have benefited employers and employees alike, employers in accomplishing business goals and employees in performing their duties. But when it comes to internet usage a business must make sure that company policies are followed and the employee’s work product does not suffer as a result of unwarranted internet usage.…

    • 1782 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Computer Security risk can be classified into two main categories which are computer crimes and cybercrimes. Computer crime involves knowingly interfering with computer security which involves a deliberate act against the law and cyber crime is defined as “Traditionally, crime has been defined as an intentional violation of the legal code that is punishable by the state”. (Vermaat, 2010) Cybercrime has become a serious crime and the FBI as include this into their top three priorities. The perpetrator of cybercrime and computer crimes has fall into seven basic categories which are hacker, cracker, Script Kiddie, corporate spy, unethical employee, cyber extortionist, and cyber terrorist.…

    • 1438 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Internet abuse

    • 1449 Words
    • 5 Pages

    Modern society is the internet age. The internet has been adopted in different industries including business and it has its drawbacks in business. It can cause internet abuse in the workplace. Internet abuse in the workplace is an unacceptable behavior which means surfing the internet for personal affairs in the workplace and breaking principles of corporations. Employees can get access to the internet in the workplace and do non-work related network activities. Non-work related network activities can distract employees’ attention and they can not accomplish their job tasks efficiently. Internet abuse may cause loss in terms of productivity, revenue and corporate image. Corporations need to pay attention to this problem. The purpose of this essay is to evaluate solutions which are used to solve internet abuse in the workplace. This essay will be divided into two main parts. The first part focuses on finding causes of internet abuse in the workplace and describing these causes. The analysis and evaluation of solutions are in the second part.…

    • 1449 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The Need for Cyber Ethics

    • 1591 Words
    • 7 Pages

    The cyber world has become a most important part of our everyday lives. We spend an increasingly significant portion of our lives in it and use it to communicate with friends, acquaintances, loved ones, and business associates. We make use of our computers and Internet connectivity to look for and purchase all kinds of goods and services. We use the web and all its powerful resources to educate ourselves and to gain knowledge. We are able to look for, join and keep up with special interest groups and to discuss topics of interest to us. We research serious as well as mundane issues on line.…

    • 1591 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Today’s society is solely based and dependent on computer based systems. With the advent of computer technology, we have acquired many good things like online banking, online commerce, emails etc. Along with the advancements in technology comes the relentless pursuit to prevent criminal hacking. Criminal hacking affects big business as well as the individual. The modern ethical hacker is a person who attempts to penetrate a secured computer system in effort to learn how to further protect or repair weaknesses in a company’s already secure system. “According to the Sixth Annual Enterprise IT Security Survey released Monday, 67% of large companies with 5,000 or more employees reported one successful intrusion or more this year, as opposed to 41% in 2009.” (Messmer)…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Fraud cannot be eradicated, but fraud and corruption risks can be managed like any other risks. The economic crunch created the premises for a substantial increase of the computer crime and fraud. Computer crime or cyber crime refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of the crime. The global total of criminal gain from cyber fraud is impossible to estimate precisely, but has increased exponentially in the past 4 years. However, in the last few years, the computer specialist and internal controllers understood the fraud schemes and their characteristics and they know how to act to prevent them.…

    • 707 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In other countries such as the United States, there were several laws passed to protect the public of computer misuse. Thus, global pressure is now on the Philippine government to stop such abuse. This prompted the government to pass a law addressing specifically those criminal activities carried out by means of computers or the internet. Hence, the passage of Republic Act 10175 “AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES”.…

    • 1318 Words
    • 6 Pages
    Good Essays