Saturday, January 25, 2020

Workplace Monitoring Surveillance And Workplace Privacy Information Technology Essay

Workplace Monitoring Surveillance And Workplace Privacy Information Technology Essay Today business is being conducted electronically because internet access in every organization has become a business necessity. The internet, social networking, email, websites, forums, wikis, blogs, and instant massaging are the essential tools that an employee uses to communicate, collaborate and to do research work. But, these resources could be misused for private and illegal activities. As we all know the majority of all employers monitor employee arrival and departure time. Almost every organization, cash has been handled accurately. The majority monitor accuracy and quality of there employees work. Each and every employer expects maximum productivity from there employees. The employers think that the monitoring is not unreasonable; monitoring is commonly accepted as a business requirement. Still large number of organizations they do not monitor the manner in which the workers use there computers. The improper use of computer tools can have serious threats for an organization. In a computer base business environment lost of productivity wont be the only issue that an employers face how much time do they spent for none related activities? For instance, how much time were employees surfing the internet? What do they do during there time online? Play games, look for the perfect partner? How many none related emails that they got and send? By doing numerous none related work they waste valuable the time of the employees and network bandwidth of the company sometimes, employees get internal confidential information and data and use them for illegal purposes. Therefore, the monitoring in this regard should be highly considered. Personal surfing has become a nuisance for employers. Employees utilize computer tools for there leisure and pleasure within the normal working hours. A survey revealed that in an organization the lost time of an each employee is around 2.5 hour per worker. With the use of the number of work force and the hourly pay rate the total employee cost of cyber lacking could be estimated and it was a considerable amount. One of the security company, Sophose disclosed 60% of its uses accessed the social networking site, Face Book during the working hours. And that more than 25% of its uses accessed the site more that 10 times each day during working hours [Employee Computer PC Activity Monitoring Solution]. Around the world approximately there are fifty million Face Book users per day. And this number is increasing by 200,000 per day. How many cyberlackers are there in your organization and how much do they costing? The other important matter to be taken to consideration is Intellectual Prope rty Theft (IPT). Interconnected computers and mobile instruments provide new opportunity for people for access and steal data. These data could be conveyed to a laptop or a flash drive. Carnage Mellon Universitys software engineering institute has found 75% capital IPTs were done by internal machines in the staff. In recent case a research chemist has being admitted to stolen $400 Million worth of property data from his former employer DUPOINT [Employee Computer PC Activity Monitoring Solution]. Fraudulent often has access to very confidential information which can be misused by the employee or sold to a third party. It is stated that HSBC customer personal accounts were stolen up to $500,000 after the HSBC employee passed on data in to a criminal associate. [Employee Computer PC Activity Monitoring Solution]. Employers hold some form of legal liability and accountability for the actions done by there employees. According to the institute of e-policy, a considerable percentage of employers were prosecuted by courts due to improper use of electronic mail and web based technologies [Employee Computer PC Activity Monitoring Solution]. Therefore, monitoring employee activities is not a universal remedy to the above problems discussed. Introduction of Effective monitoring with an electronic policy could be implemented as a part of a risk management strategy. Computer Monitoring and Electronic Monitoring is rapidly to growing readably in world business. The technologies have become more powerful and easy today. It is inexpensive to install and maintain. Therefore, the rate of electronic monitoring in developed countries has increased considerably. In United States in 1999 the percentage of employer who electronically monitor there workers was 67%, in 2001 this number has increase to 78% by 2003 92% of employers were conducting some type of work place monitoring [National Work rights Institute]. This rapid growth of monitoring could be destroyed any sense of privacy as we know in American work place. In Srilanka the government embarked ambitious program that establish email and internet all government sector organization in 2003. Under this program they are equipped with a computer and a wide access to online environment has raised numerous privacy related questions for both employers and employees. In particular issues of email and internet usage and employee monitoring in the work place is an important matter to be taken in to consideration. And also issue of electronic surveillance in the work place has an impact on employee privacy rights. There are four categories of usage in organizations. Sending and receiving email, accessing and posting documents on the World Wide Web (WWW), sending and retrieving computer files which is known as File Transfer Protocol or FTP and joining electronic discussions such as news groups internet related chat groups. Email is a widely used internet service although many users are active in all categories. We could see two interest parties exist in an organization and two competing interests in the employment context. The employers right to conduct business in a self determination manner and the employees privacy interests or the right to be let alone. For employer and managers, employee monitoring is a necessity. It has been argued that email and internet monitoring in a work place are the most effective method to ensure a safe and secure working environment and to protect employees too. In addition to that, some argue with that monitoring may boost efficiency, productivity, customer service and allow more accuracy to evaluate employee performance [DeTienne, 1993]. Different types of monitoring systems could be implemented by the managers in there particular organizations. In a computer based work place employee key stroke speed and accuracy is commonly monitored by the employers. Other electronic devices such as video surveillance which detects employee theft and employee safety. Spying is a detective tactic. When there is suspicious activity within the organization, they use systems for tapping of phone calls, the frequency of phone calls and Badge system to locate the employee within the working hours. It is argued as to whether employee monitoring is advantages to the employee. Advantages could be identified a few in number, comparing to the number of disadvantages. Electronic monitoring is beneficial for the employee because it provides impartial method of performance evaluation and prevents interferences of managers feelings in an employee review. Data information collected by the electronic system offers uniform and accurate feedback on the past performance. Therefore electronic evaluation system would be the best performance appraisal based on the quality and quantity and accuracy of an employees actual work, rather than managers opinion. Where there are computers and electronic monitoring is available it provides flexible in-work locations convenient. Working hours by allowing employees to telecommunicate or use system available from the employer The advantages as well as the disadvantages are important to employees because advantage is helpful to employees disadvantages due to monitoring crates negative influence to the benefits of an employee. Some of the employers do monitoring by using law cost methods for better productivity and a good customer service. But the employers, those who really use modern methods to exerting control and power over employees. Electronic technology which uses for monitoring has made it easy of collecting private-data information that could be used negatively against the employees character or behavior and to take unfair decisions to harass the trouble maker and the union organizers within the organization. Fairness in how monitoring is implemented has to be considered. Whether the standers are reviewed as reasonable, the information collected should be work related and important for the employees quality of work life of day-to-day life and not other than anything else [Levy. M, 1994]. In this computerized world, where information and data are the most valuable consumer goods. Personal data is the life of the new economy when the process of information exchanges. For some businesses information is money and for this reason they buy and sell information derived from personal data. In the same way for some governmental and military organizations information and data are for their security purposes, for this reason, they manipulate personal data and information in the name of safety and public security. In both cases we could see that an individual or groups do not have always ability to control the flow of there personal information and data and are unable to determine for themselves when, how, and which personal information should be shared with others. Although information technology is related to privacy violation, that the privacy is not a new issue. It is not computes invade privacy but people who have the tendency in many ways to invade the privacy of others. Presently privacy problem seems become even worse, and information technologies such as network database, digital and tele cameras, microphone transmitters and monitoring hardware devices and software programs. The aim of these technologies to select different kind of data information for various purposes. However sometimes personal information and data is maintained without the permission of the individual and personal data travel on the super high way offering invaluable information and details to various parties from marketing companies to government agencies. Creation of electronic surveillance and monitoring in an organization, create unnecessary stress and pressure on them. Under these conditions heavy workloads and repeating functions leads them to social isolation and loss of job satisfaction. Under this type of working conditions a study revealed, that monitored employees suffered from physical and psychological health problems [Levy, 1994]. Employers today, depending the business they do, generally conduct monitoring in there organizations in order to increase productivity and customer care. Most of the employers initiate electronic monitoring which results devastating to employee privacy. Employee monitoring systems frequently record personal communications while at work. Internet monitoring is very invasive especially in a computer environment. It would be easier to communicate through internet than on there office telephone or email. Most invasive of all is video monitoring. These hidden video cameras installed in every were of the work place or factory such as locker rooms and bathrooms and there stoles. Some employers dont know when and what they are being monitored or watched. Some employees know that they have a standard employer who reserves the right to monitor anything at any time. While other employers do not know whether it is there email, voicemail, web access or hard drive or whether they are being monitor ed at all. Therefore, it is clear that the privacy at the work place is at a risk. Therefore, before initiating a program of monitoring employers carefully should consider effective solutions other than monitoring. Business field should have properly trained managers who are capable to deal with sensitive employee subjects. Supervising staffs can set conduct guidelines, address concerns, mediate complaints as well as monitor deal with those employees that choose to abuse company resources. Business should always conduct as in-house assessment to identify whether electronic monitoring is even necessary. Management should speak with employees regarding the productivity problem. Employee may suggest alternative ways to solve the problem if monitoring is chosen; employee may participate designing the monitoring program. If monitoring is conducted the scope must be as narrower as consistent with achieving the particular objective. If the company chooses to adopt electronic monitoring, notice should be given in advance of any monitoring. This notice specifically state what would be monitored and when this would occur. Protection of employees privacy by law is more important where monitoring is conducted. Therefore, to develop a privacy policy in the workplace, an ethical involvement in computer monitoring and work place privacy has to be taken in to consideration. Computer ethics deals with the balance between employee rights and employer interests and development of an effective employer use policy. On a practical basis any computer based organization can draw upon a code of ethics or policy should include the following theories The Law which include moral principals include with negative consequences for disobedience. Code of practice guidelines for employers to work within the organization. Professional Ethics Guidelines to employers/ managers to work within the organization. Personal Ethics Values that influence actions of the individual Monitoring mechanism is very important to employees for many reasons. Failure, to inform and advice the employees that the computer based activities will be monitored maybe a violation of employee privacy rights according to the certain judicators. If the employees have been notified that they are being monitored they will be compelled to prevent from breaching the AUP (Acceptable Use Policy). Furthermore undisclosed monitoring would bring negative impact on employee moral. Therefore following steps could be taken to formulate a acceptable use policy (AUP). An AUP should be communicated to staff of the organization in writing Permitted and prohibited activities should be setout for the usage of e-mail, internet and other applications. Specify the disciplinary actions that will be taken for the disobedience for the AUP. Employer should notify that they are being monitoring and when and what will be monitored. Although both employer and employee should stick to this AUP, there may be particular that could be unannounced monitoring is taken place. But such action should be taken, only after a legal advice. It is advised that an AUP should be supported with worker educational programs too and in these educational programs it should be discussed on the following topics. The necessity of an AUP? That compliance should be compulsory The conditions applicable in the AUP The consequences to disobedience The extent of monitoring Who should consult with any questions about the AUP In this manner employer and employee relations could be established and maintained, industrial peace and the privacy rights of the employee will be secured to create a computer based environment which would enhance production and productivity. That would lead to economic development. The educational program will not only educate the AUP to workers and ensure compliance; it may also introduce of good codes of practices within a social framework and entering them in to legal process. In the contrary, it may provide a defense against law suits by enabling an employer or an organization to demonstrate that all responsible steps were taken to ensure that the work place is free from harassment and all efforts were taken to provide maximum possible protection for employee privacy rights and to maintain the workplace privacy rights of the employees in the organization. Taking in to privacy violation, in the information society it is important to discuss about the right of privacy to some extent. Communication privacy includes privacy of email, teleconference, voice telecommunication and postal mail. Information privacy determining the purpose of use and communication of personal information with others. It consists of rules including legislation and industrial codes concerning with the collection, providing data on request, scatter about selective information or personal data such as credit information and medical and governmental data information and records. With regard to computer ethics, communication and data communication privacy are the main concern. Method of privacy violation in the data communication and technology sector could be classified in to the following categories, Intrusion: wrongful entry of acquiring procession of property belongs to another and by extension, violation of privacy. Misuse of data information: illegal use of information for unauthorized activities Interception of information: unauthorized access to private information by a third party to a private communication. Data matching: data combined, linked and compared from two of more unrelated databases to create new information. The purpose of data matching is to regain statistical information, or create computer profiles. This data matching is used for instance, by security agencies to discover wanted criminals, terrorists or missing persons or by tax agencies to find out illegal earnings and tax defaulters. Data mining: the collection of masses of data into one or more data bases in order to get new information and knowledge that was previously hidden and unidentified. It is used in direct marketing, allowing marketers to combine various criteria taken from databases to focus on a specific target group. [Stamallos.G, 2007] According to the above possible methods of privacy violation, databases, networks do a major role therefore, what can be done to protect individual personal privacy? Some of the governments have tried to protect personal data through special legislations or privacy guidelines. In 1998 OECD (Organization for Economics Corporation and Development) ministers adopted the declaration on the protection of privacy on global networks in order to ensure the respect of important rights, build confidence in global networks, and prevent unnecessary restrictions on transborder flows of personal data. UK parliament published the data protection act of 1998 which protects the personal data of an individual (Stored in either digital or paper form) from unreasonable or illegal use. The Australian Federal Government the OECD guidelines with privacy act in 1988. The US privacy legislation seems to be a special one but more recently the US privacy legislation has supplemented two major laws on the use of personal data. One is the privacy act of 1994 and the other one is the computer matching and privacy protection act of 1998. [Stamallos.G, 2007]. It is very clear that old common laws do not really cover the area of work place privacy in many countries. Therefore, a gap exists between the times when a new communication technology is created; new laws have to be designed by the state legislature to cover the new technologies and to protect the work place privacy as well.

Friday, January 17, 2020

Early Childhood Education Past and Present Essay

In order to decide how past philosophies, theories and educational models have influenced present ideas and practices related to early childhood education, we must first decide where we would like to begin. I will start with the ideas of Aristotle, because I believe his ideas on â€Å"mimesis† or imitations are evident in the evolution of early education, and will always be an integral part of effective learning. Once we understand that children learn and practice what they see in others, we begin to realize the need for dedication and devotion from parents and teachers. Aristotle was a student of Plato who argued for the early removal of children from their parents so that they could be cared for in a school like setting. (Schwartz 1997) As we look back at history itself, we can see that the role of childhood education has been dependent upon the immediate needs and beliefs of a particular society. There have also been many individuals in the past 200 years who are responsible for creating theories and philosophies based on their observations of children and what is vital to them as they develop into adults. However, it is important that we recognize how new ideas are not formed independently, but built upon old ones. As educators, we must utilize what we notice to be effective, as well as the things that impacted us most as children in an educational setting. The strategies and philosophies that I’ve implemented in particular are borrowed from several individuals including Erikson, Vygotsky and Gardiner. Erikson’s psychosocial theory covers eight stages, each one built upon, and reliant on its predecessor. The first four are of greatest relevance, but the remaining four are worthy of a close look because it is important to know where you’re going when deciding upon the best way to get there. These stages also remind me of the importance of satisfying basic need, and of considering children as little people who need to believe in success before they can achieve it. It’s one of the reasons why I would occasionally go to recess with my students. I was able to observe how they treated and responded to others in a seemingly more relaxed, social setting. For some children, recess is by far the most stressful twenty minutes of the day. The incredibly minimal amount of time given to my students was another reason I felt it was necessary to attend. I could get a kick ball game set up so they could make the best of what little time they had. However, I must be honest, I still love to play, and demonstrating good sportsmanship and a competitive spirit to my kids was as important as the preparation for any test we had to look forward to. Lastly, I had a sixth grade teacher who used to do the same thing and I remember it vividly and extremely fondly. I find Gardiners’ theory of multiple intelligence extremely helpful while building confidence in kids whose gifts were not overly apparent on the field at recess. I have and will always encourage students to recognize and display these gifts while still maintaining a certain degree of humility. (Hyson 2004) I’ve always kept examples of completed activities inside and outside my classroom and anywhere else I could find space in order to, among other things, initiate discussions about pride as well as humility. Our classroom clearly demonstrated the fact that comfort and familiarity were held in high regard. An equal emphasis was placed on respect, and this is the word that was constantly spelled out on the board. As my class or one of my students showed an obvious lack of respect, one of the letters would be erased. They would be put back as we were respectful of one another, and if the word was entirely spelled out on Friday afternoon, we would have a â€Å"social gathering† for the last half hour of the day. If we were to walk into most, if not all early childhood educational settings, we would find many things that were initiated or influenced by past theorists or philosophers. We would notice blocks or other creative building materials. There would be areas to encourage cooperative learning, and most would reflect what is thought to be developmentally appropriate for the range of members in the class. When determining what types of play are developmentally appropriate, we need to consider all individuals, and the fact that differences will exist. Members of a class who are either gifted or struggling should not have to suffer because of what is thought to be developmentally appropriate. These differences should be expected, utilized and appreciated. Computers, for example, will run programs with varying degrees of difficulty depending upon what is developmentally appropriate for an individual. As concerns continue to grow over bridging the gap between early education students, government intervention has and will continue to grow. An increase in assessments is inevitable, and even smaller amounts of time will be devoted to active learning, exploration and play. The changes that in fact need to be made are those that reflect the ideas of the great minds of theorists who dedicated their lives in order to determine the most effective methods of early childhood education.

Thursday, January 9, 2020

Eat More Weigh Less By Dr. Dean Ornish - 961 Words

The diet book I choose was â€Å"Eat More Weigh Less† by Dr. Dean Ornish. This diet has no time frame, you can use this diet until you have met the desired weight. Most people don’t want to give up eating junk food, but maybe with this diet you can eat something healthy that tastes equally as satisfying. Also, these recipes will definitely keep someone feeling refreshed and satisfied. On page 106 of the book, Dr. Ornish gives his readers a sample week of foods. I thought this was a great way for people to experiment his diet without feeling like they have continue it until it’s â€Å"end date†. For Day 1 of the diet he suggests that for breakfast people trying the diet should eat cold cereal, nonfat yogurt, fresh berries, orange juice, and a warm beverage. For this meal, people obviously have to monitor the types of food that they will intake. Someone can eat cold cereal, however they can pick a cereal that contains large amounts of sugar. For this I would suggest that they choose organic foods for a better outcome. Continuing on for the day, at lunch he recommends having a stuffed baked potato, broccoli, potato, and chick-pea salad with lemon-tarragon dressing, a tossed green salad, and fresh fruit. This a loaded with carbohydrates, protein, and vitamins. Finally, he suggests eating bruschetta with sun dried tomatoes and capers, pasta with red peppe rs, greens, white beans, garlic, and lemon zest, grilled asparagus, with lemon, peppers, and caper vinaigrette, a tossed green salad,

Wednesday, January 1, 2020

Essay on Six Debates over Macroeconomic Policy - 1363 Words

SIX DEBATES over MACROECONOMIC POLICY SIX DEBATES over MACROECONOMIC POLICY ISSUES | YES | NO | 1. Whether or not monetary and fiscal policymakers should try to stabilize the economy | Advocates of active monetary and fiscal policy view the economy as inherently unstable and believe that policy can manage aggregate demand, and thereby, production and employment, to offset the inherent instability. When aggregate demand is inadequate to ensure full employment, policymakers should boost government spending, cut taxes, and expand money supply. However, when aggregate demand is excessive, risking higher inflation, policymakers should cut government spending, raise taxes, and reduce the money supply. Such policy actions put†¦show more content†¦Increased spending on investment adds to aggregate demand and helps to restore normal levels of production and employment.Fiscal policy, on the other hand, can provide an additional tool to combat recessions and is particularly useful when the tools of monetary policy lose their effectiveness. When the govern ment cuts taxes, it increases households’ disposable income, which encourages them to increase spending on consumption. When the government buys goods and services, it adds directly to aggregate demand. Moreover, these fiscal actions can have multiplier effects: Higher aggregate demand leads to higher incomes, which in turn induces additional consumer spending and further increases in aggregate demand.Traditional Keynesian analysis indicates that increases in government purchases are a more potent tool than decreases in taxes. When the government gives a dollar in tax cuts to a household, part of that dollar may be saved rather than spent. The part of the dollar that is saved does not contribute to the aggregate demand for goods and services. By contrast, when the government spends a dollar buying a good or service, that dollar immediately and fully adds to aggregate demand. | Critics of spending hikes argue that tax cuts can expand both aggregate demand and aggregate su pply and that hasty increases in government spending may lead to wasteful public projects.Tax cuts increase aggregate demand by increasing household’s disposable income, asShow MoreRelatedThe Study of Macroeconomics1507 Words   |  7 Pages†¢ Micro vs. Macro †¢ Microeconomics – the study of how individual households and firms make decisions and how they interact with one another in markets. †¢ Macroeconomics – the study of the economy as a whole. – Its goal is to explain the economic changes that affect many households, firms, and markets at once. †¢ The Two Groups of Economists †¢ Macroeconomists †¢ Focus on the economy as a whole. †¢ Spend much time analyzing how total income changes and how changes in income cause changes inRead MoreAn Informal Link Between The Level Of Financial Intermediation And Economic Development1631 Words   |  7 PagesImportant Banks (SIBs) of Sri Lanka, are the main contributors for an efficient and stable financial sector. Hence, a study on the determinants of the IRS of SIBs of Sri Lanka is vital to understand the process of financial intermediation and the macroeconomic environment in which that the banks operate. 2. Statement of the problem IRS of banks is one of the main variables that measure the efficiency of a banking sector. High IRS can generate negative consequences in the economy, since there is anRead MoreThe Change Of The East India Company Monopoly1478 Words   |  6 Pagespleased would have their course closed. Finally, prior to his death, about a year or less, Say was given a political economic chair at the France College. Say was for the thought that, his discipline should have the name â€Å"social economy,† as economic policies, and economic laws impacted the society as a whole. Even though he was not feeling well in his last years of life, Say was still productive and was still writing, overseeing and lecturing the fifth version of his famous book ‘Treatise whichRead MoreThe Inequality Of Poverty And Deprivation Throughout The World1368 Words   |  6 Pagesonly part of the story, and depending on the place and the time period in question, it may not be the most important part of the story. It may be that other policies, in addition to redistributing income directly, have a vital role to play in reducing inequality. In the past year, there has been something of a revival of the public policy debate on inequality of income and wealth, a welcome development in light of the alarming trends of the past few decades. Thomas Piketty’s brilliant work, CapitalRead MoreGovernment Involvement Of Fiscal And Monetary Policies1431 Words   |  6 PagesStudy Governments make use of different macroeconomic policy instruments such as fiscal and monetary policies to stabilize the macro-economy and brig about growth to their respective countries. Yet there are debates on the efficiency of each of these instruments. The extremity in the debate is to the level that some economists arguing ineffectiveness of fiscal and monetary policies in all countries. There is another group who regard them as important policy tools, while they agree that their effectivenessRead MoreThe International Monetary Fund ( Imf )1310 Words   |  6 PagesIn the last chapter we looked at how incompetent and politically driven economic policy making drove Europe into prolonged recession and high unemployment. The financial crises and fear of a meltdown slowed world economic growth considerably. In October 2010, the International Monetary Fund (IMF) projected 4.6 percent growth for the global economy in 2013; it ended up being just 3 percent. This difference may not seem like much, but in terms of lost output it is more than $800 billion, and it isRead MoreMacroeconomic Policies Of Fiscal And Monetary Policies Essay1387 Words   |  6 Pagesmake use of different macroeconomic policy instruments such as fiscal and monetary policies to stabilize the macro-economy and brig about growth to their respective countries. Yet there are debates on the efficiency of each of these instruments. Some economists argue that fiscal and monetary policies are ineffective in all countries while the other group argue that they are important policy tools, though their effectiveness depends on conditions in the economy. Fiscal policy is one of the commonlyRead MoreThe Economic Crisis Of The G202112 Words   |  9 PagesPittsburgh Elevation in September 20 09 to institutionalize the Chemical group of 20 leaders ’ summit reflects a marked shift in the locus of leadership. New players, new meeting place and new issues have moved to the center of global decision-making. Over the course of its first class, the G20 has delivered in response to global economic challenges, at least in a declaratory fashion. However, as we move towards a billet crisis environment, the G20’s follow-on year will bring new challenges. In the lead-upRead MoreUnequal Distribution of Wealth Essay1487 Words   |  6 Pagesgreat depression. In my opinion, many of our countries problems stem from the unequal distribution of wealth. Wealth is unequally distributed in today’s society The unequal distribution of wealth is seen as a negative and ongoing problem and debate within American politics and society. There is a great deal of evidence to back up why wealth distribution is damaging the American ideals of life. It also carries inevitable and undetermined consequences for our nation. How resources are distributedRead MoreSources Of Income For Individuals Developing Countries1498 Words   |  6 Pagesdeveloping economies in the last decade have grown by about six folds, from $56 billion in 1995 to $334 billion in 2010 (Kanu and Ozurumba 2013). Given its size, stability and countercyclical behavior in the face of external shocks, policy attentions are now focused on mobilizing remittances to leverage growth and poverty dividends as well as utilizing it to cushion the impact of economic shocks (World Bank 2010). There has been a growing debate on how the often voluminous migrant remittances are used