Page 181 -
P. 181

180 Part One  Organizations, Management, and the Networked Enterprise


           The major fault of Carmarthenshire College was    certain sites (e.g., YouTube, Facebook, etc.), but a blan-
        in not having a usage policy in place. Employers and   ket blocking of such sites could cause problems if an
        employees should have an agreed-upon policy as part   employee has a legitimate need to access a site. In
        of the contract of employment that clarifies what is   addition, should sites be blocked during lunch hour? In
        and is not acceptable computer usage in the work-    any case, blocking such sites on the desktop computer
        place. The employer can then follow normal disciplin-  is becoming less of a guarantee of increased produc-
        ary procedures if an employee is using workplace     tivity nowadays (if it ever was), as more and more
        equipment in a manner that is not permitted in the   employees will just use their smartphones to access
        contract of employment.                              these sites anyway.
           Whatever the legal situation, it is clear where poten-
        tial problems can occur in the workplace regarding   Sources: Information Commissioners Office, “Employment
                                                             Practices Data Protection Code-Supplementary Guidance” (www.
        information technology use. An e-mail, once sent,    ico.gov.uk/upload/documents/library/data_protection/practi-
        becomes a legally published document that can be     cal_application/coi_html/english/supplementary_guidance/mon-
        produced as evidence in court cases involving issues   itoring_at_work_3.html, accessed October 25, 2010); “Spector 360
                                                             Helps Blackburn Rovers Show Red Card to PC and Internet Abuse,”
        of libel, breach of contract, and so on. Most businesses
                                                             Snapguard (www.snapguard.co.uk/blackburn_fc.html, accessed
        rely on their company data to keep ahead of the com-  October 25, 2010); “Citizens Advice Bureau Advice Guide, Basic
        petition. Therefore, the loss, theft, or sabotage of data   Rights at Work,” Adviceguide (www.adviceguide.org.uk/index/
                                                             your_money/employment/basic_rights_at_work.htm, accessed
        is potentially more dangerous than similar problems
                                                             October 25, 2010); “Employee Monitoring in the Workplace: What
        with hardware. If a stick is lost in a bar parking lot,   Constitutes ‘Personal Data’?” Crowell and Moring (www.crowell.
        replacing the hardware will cost a few dollars, but if it   com/NewsEvents/ Newsletter.aspx?id=654, accessed October 25,
        contains the company’s confidential data, then its loss   2010).
        could put the company out of business!               Case contribued by Andy Jones, Staffordshire University.
           Many companies place great focus on employee
        productivity. It is relatively easy to block access to


       CASE STUDY QUESTIONS


        1. Do you consider the approach taken by Blackburn     downloads unsuitable images, which he later sells
           Rovers to be too strict on employees, too lenient,   to his friends. He would not have been able to
           or just right?                                      download the images at home, because you have
        2. Consider the five moral dimensions described in     installed parental control software. Who is to
           the text. Which are involved in the case of         blame for his indiscretion?
           Copeland v. the United Kingdom?                   4. Why is the digital divide problem an ethical
        3. Consider the following scenario. Your 14-year-old   dilemma?
           son attends a soccer academy. While there, he


                                     Computer abuse is the commission of acts involving a computer that may
                                   not be  illegal but that are considered unethical. The popularity of the Internet
                                   and e-mail has turned one form of computer abuse—spamming—into a serious
                                   problem for both individuals and  businesses. Spam is junk e-mail sent by an orga-
                                   nization or individual to a mass audience of Internet users who have expressed no
                                   interest in the product or service being marketed. Spammers tend to market por-
                                   nography, fraudulent deals and services, outright scams, and other products not
                                   widely approved in most civilized societies. Some countries have passed laws to
                                   outlaw spamming or to restrict its use. In the United States, it is still legal if it does
                                   not involve fraud and the sender and subject of the e-mail are properly identified.
                                     Spamming has mushroomed because it costs only a few cents to send  thousands
                                   of  messages advertising wares to Internet users. The percentage of all e-mail that
                                   is spam is estimated at around 72 percent in 2012 (Symantec, 2012). Most spam
                                   originates from bot networks, which consist of thousands of  captured PCs that
                                   can initiate and relay spam messages. Spam volume has declined  somewhat since
                                   authorities took down the Rustock botnet in 2011. Spam is seasonally cyclical,






   MIS_13_Ch_04_Global.indd   180                                                                             1/18/2013   10:27:42 AM
   176   177   178   179   180   181   182   183   184   185   186