Reasons why employers monitor workers

Reasons why employers monitor workers

 

Week 5 Homework Assignment

1. Are surveillance cameras worth the cost in terms of resources and loss of privacy, given the role that
they play in deterring or solving crimes?
2. Do research to find out the current status of “Do Not Track,” and write a two- to three- paragraph
paper summarizing your findings.
3. Do you feel that information systems to fight terrorism should be developed and used even if they
infringe on privacy rights or violate the Privacy Act and other such statutes?
4. Why do employers monitor workers? Do you think they should be able to do so? Why or why not?
5. Do you think that the installation of stalker software on suspects’ cell phones should be authorized
for law enforcement agencies? If so, under what circumstances should such use be permitted? If
not, why not.

Note: Every question should have a least 200 words with references.

 

Solution

Question One:
The main goal of public surveillance cameras is to generate automatically focus-of-
attention messages in order to help the human operator to concentrate his attention capabilities
on possible danger situations. In this way, they overcome possible human failures and better
surveillance performance obtained (Foresti, 2016 p.1). Cameras, Surveillance are linked to
reduced burglary, including past the areas that the cameras cover. The knowledge of the
existence of surveillance cameras alone would reduce the possibility of occurrence of crimes
since the intending criminals fear tracing or arrest in case they are caught. The cost savings
associated with crimes prevented through camera systems in various cities yield about fifty-
percent return per amount invested in the technology.
The cameras are only as intelligent and as useful as those operating them and the
operators are capable of detecting crime and help curtail an otherwise likely crime (Foresti, 2016
p.12). The expenses, therefore, are justifiable irrespective of compromised privacy. Well trained
operators monitor most effective camera systems; contain sufficient cameras to detect robbery in
action, and integrate the technical know-how into law enforcement activities. Camera footage
provides an additional lead to the police in the investigation process and aids in securing
witnesses cooperation. Video footage always act as a complement for eyewitnesses in the court
but does not replace them. Surveillance cameras are therefore worth the cost regarding resources
and loss of privacy since they yield great results in the role of deterring and solving of crimes.

HOMEWORK ASSIGNMENT 3

Question Two:
Do Not Track is a strategic policy proposal that allows clients to opt out of tracking by
websites they do not visit, including analytics services, advertising networks, and social
platforms. Currently, limited third parties come up with a valid way of avoiding tracking, and
tools for blocking them are not user-friendly and not comprehensive. It provides users with a
single, but the simple, consistent option to avoid third-party tracking via the web.
One of the numerous potentially bifurcating matters is privacy. Some clients may wish to
aim adverts, while others would not wish to have any information passed at all while they are on
the internet. In order to create a single standard among the creators, Do Not Track standard was
created (Stevens, 2016 p. 7). Do Not Track signals a user’s escape preference with an HTTP
header, a technology compatible with the web that is in existence. Some third parties have agreed
to abide by Do Not Track but others have not. Major online advertising trade groups that
promised and pledged to support Do Not Track from the end of the year 2012 are yet to fulfill
those promises. Efforts have been made to standardize Do Not Track in the web consortium
worldwide have all resulted in deadlock despite frequent urging by the policy makers in America
and Europe.
Do Not Track could succeed, however, there are legal or technical requirements for
implementation In the meantime, novel technical measures like the cookie clearinghouse hold
promise for bringing about simple and effective user choice over web tracking (Stevens, 2016).
It’s extremely important to note that there is no list that clients need to sign up. Previous analysis

HOMEWORK ASSIGNMENT 4
of Do Not Track involved proposals on a list-based register of clients, as in the Call Register.
This proposal does not collect information about users in a central list.

Question Three:
I think that information systems to fight terrorism should be developed and used even if
they infringe on privacy rights or violate the Privacy Act and other such statutes because the
effects of terrorism infringe the most important of all rights, the right to live. Terrorists stop at
nothing but terminate other human’s lives and, therefore, every measure to stop terrorists is a
worthy step. The society thinks itself safe with the feeling of both its privacy and security being
ensured at the same time. However, if the privacy issue is overlooked, it would be easier to
protect everyone else and a lot easier to track terrorists.
According to Croft, (2016), terrorism needs to disturb people more as opposed to their
need for privacy. There are very effective technologies that could track and apprehend terrorists,
but are not used because people are more worried about rights to keeping their information
private. The chip could be implanted in people and instead of reading them with a scanner; a
signal could be transmitted to a satellite to show exactly there location everywhere. A measure
such as this would bring to an end among many other offenses, terrorism. If people could be
tracked and kept under control, people would not worry about keeping their information private
because there would be no need for it. In many ways everything you one thinks is private is not
as long as they think that it is then they feel safe however they are not.
Question Four:

HOMEWORK ASSIGNMENT 5
Employers are responsible for guiding workers on the generally accepted usage and the
consequence for misuse. They, therefore, must follow closely the employees to ensure they
follow these policies as stipulated in the workplace policy document. However, employers must
be aware of types of surveillance that cross the line and infringe on an individual’s right to
privacy. The reasons discussed below show why it is important that employers monitor the
employees.
Employment records contain sensitive personal information, such as bank account
numbers, which if not protected, could lead to identity theft therefore employees access to such
documents must be monitored and regulated (Kurtz, & Boon, 2016).
Phones used in the course of transacting company business belong to the company, and
the employer could monitor the conversations if they wished. Just about everyone has heard the
disclaimer, this call may be monitored or recorded for training purposes, when calling a customer
service line. Such aspects that involve the use of company property, monitoring is necessary
(Kurtz, C.& Boon, 2016). In fact, employer tracking of its communication patterns and systems
is an act rated a responsible organizational practice.
According to Kurtz, C., & Boon, (2016), time consumed surfing the Web site for users,
not business-related effects productivity and can expose the organization's systems to hacking
and file interference. Employees are conducting personal business ,browsing illegal websites or
engaging in unauthorized activities using social networking can cause embarrassment to the
company and drag them in the illegal activities as well. Companies should have specified
Internet usage rules and regulations that require an employee signature upon receipt. Workers

HOMEWORK ASSIGNMENT 6
should understand the limits of the company and personal use of such aspects as emails since if
they land in the wrong hands, it could open up unwarranted lawsuits against the company.
On the use of company vehicles assigned to managers or salespersons, some workers
would be tempted to use them for individual businesses. This should not happen since the
company pays for the expense on those vehicles to perform company businesses, not individual.
To regulate on such misuses, the employer must monitor the employee to ensure they remain set
to the objective of their hiring in the first place.
Question Five:
Stalker software is a type of application software used on devices to track and monitor people
without their knowledge with an intention of getting a much needed information (Reynolds,
2016). Cell phone stalking software is a type of cell phone bugging, tracking, and monitoring
software, surreptitiously installed on mobile phones. This software can enable communications
captured and recorded from gadgets with this software. In circumstances involving suspects of
crimes such as terrorism, the use of stalker software helps track down the suspected terrorists and
combat the threat posed by them. The surety is necessary however, that the suspects are actual
suspects, and all that remains is to determine their plan. The device would help in facilitating
remote observation of the identified cell phone location in real-time on a map, remotely enable
microphones to capture and forward conversations, receiving local alerts and messages every
time someone tries to call the number and remotely reading text messages and call logs.
Measures such as this if taken can help reduce drastically attempts of terrorist crimes
across the world since the terrorists execute their plans within a close circle of communication of
drawing their activities. Mostly they use mobile phones to communicate. If measures are in

HOMEWORK ASSIGNMENT 7
place to locate actual suspects, then installation of stalker software on suspects’ cell phones
should be authorized for law enforcement agencies for it will enhance security in matters
terrorism and crimes of such magnitude whose suspects can be pre-determined.

References

Croft, (2016). Trends and Developments in Contemporary Terrorism. Google Books. Retrieved
28 February 2016, from https://books.google.com/books?id=sJIjbmS-
0hcC&pg=PA27&dq=Development+and+Use+of+Information+Systems+to+Fight+Terrori
sm&hl=en&sa=X&redir_esc=y#v=onepage&q=Development%20and%20Use%20of%20In
formation%20Systems%20to%20Fight%20Terrorism&f=false
Foresti, M. (2016). Multimedia Video-Based Surveillance Systems. Google Books. Retrieved 28
February 2016, from
https://books.google.com/books?id=XTfSBwAAQBAJ&pg=PA147&dq=cost-
effectiveness+of+surveillance+cameras&hl=en&sa=X&redir_esc=y#v=onepage&q=cost-
effectiveness%20of%20surveillance%20cameras&f=false
Kurtz, C., & Boon,. (2016). Contemporary Business 2010 Update. Google Books. Retrieved 28
February 2016, from
https://books.google.com/books?id=B03ZwmnvkXQC&pg=PA511&dq=should+employers+mo
nitor+employees&hl=en&sa=X&redir_esc=y#v=onepage&q=should%20employers%20
monitor%20employees&f=false
Reynolds, E. (2016). Ethics in Information Technology. Google Books. Retrieved 28 February
2016, from
https://books.google.com/books?id=sOPKAgAAQBAJ&pg=PA165&dq=Authorization+
of+Installation+of+Stalker+Software+on+Suspects%E2%80%99+Cell+Phones+for+Law
+Enforcement+Agencies.&hl=en&sa=X&redir_esc=y#v=onepage&q=Authorization%20
of%20Installation%20of%20Stalker%20Software%20on%20Suspects%E2%80%99%20

HOMEWORK ASSIGNMENT 8
Cell%20Phones%20for%20Law%20Enforcement%20Agencies.&f=false
Stevens,. (2016). OS X 10.8 Mountain Lion Client And Server: A Review and History. Google
Books. Retrieved 28 February 2016, from
https://books.google.com/books?id=q2fWLNmdmHUC&pg=PA65&dq=do+not+track&h
l=en&sa=X&redir_esc=y#v=onepage&q=do%20not%20track&f=false

 

Order with us today for a quality custom paper on the above topic or any other topic!

 

What Awaits you:

 

  • High Quality custom-written papers

 

  • Automatic plagiarism check

 

  • On-time delivery guarantee

 

  • Masters and PhD-level writers

 

  • 100% Privacy and Confidentiality