Essays on Is It Ethical for an Employer to Monitor Their Staffs Usage of the Internet at Work Assignment

Download full paperFile format: .doc, available for editing

The paper "Is It Ethical for an Employer to Monitor Their Staff’ s Usage of the Internet at Work" is an outstanding example of a management assignment. Something the user is. .. These are also known as biometrics. This type of authentication relies on the innate physical characteristics of the user. This involves the use of iris recognition, fingerprints, facial recognition and palm scans among others. The most used identification in this category is fingerprint and iris scan (Rainer & Cegielski, 2010). Something the user has … This is analogous to house key (Van Tilbor & Jajodia, 2011).

It involves the use of smart ID cards, tokens and regular ID cards. The regular ID cards have the user picture and signature. Smartcards are fitted with a chip that has all required user information. A token differs from the smartcard through a display. Token has a display that gives a login number which is used for access. The number is not permanent and changes with each login (Rainer & Cegielski, 2010). Something the user knows … This is a mode of identification that involves passwords and phrases. A password is a phrase that the user keeps as a secret (Aycock, 2010).

Passwords are a major security problem especially when a weak password is used. This is due to fact that weak passwords can be easily attacked through cyber-crimes (Rainer & Cegielski, 2010). Something the user does … This is a form of identification that involves the use of signature and voice recognition. Voice recognition involves matching users spoken phrase recorded phrase (Aycock, 2010). The two voice signals must match. Signature recognition involves user signing their name which is matched with a previously recorded signature.

The system also monitors the pressure and speed of the signature and matches them with the stored signature (Rainer & Cegielski, 2010). Q2. Briefly discuss the following, is it ethical for an employer to monitor their staff’ s usage of the Internet at work? List three (3) acceptable and three (3) unacceptable activities you would include in an ‘ acceptable internet usage’ policy? Monitoring of employee internet usage at work is legal and acceptable. Despite this, it must be carried out within ethical guidelines (Siau, Nah & Teng, 2002). The companies have to monitor workers while paying attention to ethical treatment.

The employer has to communicate to employees through the acceptable internet use policy for the monitoring to be ethical (Urbaczewski & Jessup, 2002).


Aycock, J. 2010, Spyware and Adware, Springer Science & Business Media.

De George, R. T. 2011, Business ethics, Pearson Education India.

Hoffman, D. L., Novak, T. P., & Peralta, M. 1999, “Building consumer trust online.” Communications of the ACM, Vol.42, no.4, p.80-85.

Milne, G. R., & Rohm, A. J. 2000, Consumer privacy and name removal across direct marketing channels: Exploring opt-in and opt-out alternatives. Journal of Public Policy & Marketing, Vol.19, no.2, p.238-249.

Rainer, R. K., & Cegielski, C. G. 2010, Introduction to information systems: enabling and transforming business, John Wiley & Sons.

Rustad, M. L., & Paulsson, S. R. 2005, “Monitoring Employee E-mail and Internet Usage: Avoiding the Omniscient Electronic Sweatshop: Insights from Europe.” University of Pennsylvania Journal of Labor and Employment Law, Vol.7, no.4, p.829-922

Romanosky, S., Acquisti, A., Hong, J., Cranor, L. F., & Friedman, B. 2006, “Privacy patterns for online interactions,” In Proceedings of the 2006 conference on Pattern languages of programs (p. 12). ACM.

Siau, K., Nah, F. F. H., & Teng, L. 2002, “Acceptable internet use policy.” Communications of the ACM, Vol.45, no.1, p.75-79.

Stanwick, P., & Stanwick, S. D. 2013, Understanding business ethics, Sage.

Urbaczewski, A., & Jessup, L. M. 2002, “Does electronic monitoring of employee internet usage work?.” Communications of the ACM, Vol.45, no.1, p.80-83.

Van Tilborg, H. C., & Jajodia, S. (Eds.). 2011, Encyclopedia of cryptography and security. Springer Science & Business Media.

Velasquez, M. G., & Velazquez, M. 2002, Business ethics: Concepts and cases (Vol.111). Upper Saddle River, NJ: Prentice Hall.

Download full paperFile format: .doc, available for editing
Contact Us