Research Paper on "Securing the Electronic Frontier P. II"

Research Paper 3 pages (1009 words) Sources: 0

[EXCERPT] . . . .

SECURING THE ELECTRONIC FRONTIER P. II

Securing the Electronic Frontier, P II

Annotated Bibliography

This paper provides the annotated bibliographies of the three articles that focus on the workplace right to privacy and data encryption. McEvoy, (2002) in his article titled "Email and Internet Monitoring and the Workplace: Do Employee has the Right to Privacy" argues that the rapid development of internet and IT (information technology) has made increasing number of employees have access to the internet and email on the employer's owned computers. However, the questions have arisen whether employers have the right to monitor personal communication of employees within workplace. Many employers claim that they have the right to ban employees from using the company computer for personal use. However, this right conflicts with the National Labor Right of 1935 that protects worker's rights. Examples of companies that terminated employees from their companies include Timekeeping Systems Inc., Microsoft, Pratt & Whitney and the issue led to many court cases, which include Smyth v. Pillsbury Company, Tiberino v. Spokane Conty and Kodengada v. International Business Machine Corp. The author suggests that employee should avoid using the company email for personal use.

Miller and Tucker (2011) in their article titled "Encryption and the Loss of Patient Data" point out that fast paced of IT within the healthcare environment has facilitated collection of patient's data. The IT has been very useful for medical providers because it improves the diagnosis and treatment of patients. The downside of the IT use is that firms could face financial
Continue scrolling to

download full paper
and negative publicity if there is a breach of patient's data. For example, thousands of patients' data could be lost if a laptop that contains patients' data is stolen, and this may damage a company's reputation. The authors argue that a security breach could result to the loss of $1.6 billion of market capitalization within two days after its announcement. The author suggests that encryption is an effective tool to minimize the breach of data risks. Theoretically, encryption deters malicious hackers. However, for encryption to be successful, it requires careful data management policies.

Lugaresi, (2010) in his article "Electronic Privacy in the Workplace: Transparency and Responsibility" argues that the use of the internet and email within a workplace has given rise to collision between employers and employees. Typically, employers need to monitor employee's activities online; however, employees have the right to privacy. With this issue, the law is facing challenges to regulate the use of the email and internet within the workplace. Article 29 of Data Protection Working Party (DPWP) points out that a total ban of employees from personal use of internet within a workplace is impractical considering the importance of the internet as a vital means of communication. However, there is a contrary argument that there is a need to monitor employee to reduce abuse of the internet use. The author concludes that employee do not have the right to use company internet and email for personal use. However, employers should implement an electronic privacy policy in advance… READ MORE

Quoted Instructions for "Securing the Electronic Frontier P. II" Assignment:

Part 1 - Annotated Bibliography (1 page)

Please create annotated bibliography from the attached articles.

Part 2 - Reflective Diary - Securing the Electronic Frontier, Part 2 (2 pages minimum)

Please create record of reflections about experiences, attitudes, opinions, and feelings in relation to the information technology (IT) and cyber ethics. Provide thoughts, feelings, ideas, and emotions.

Please use attached articles and consider these ideas in regards of Securing the Electronic Frontier, Part 2:

The impact of the differences of how encryption is used to secure information and its relationship to Pretty Good Privacy (PGP) within the perspective of IT ethics.

The difference between the concept of trespass and legitimate access as it applies in the real-world application of cyber ethics.

The effect of the technology of encryption code, privacy, and the balance sought by free speech advocates.

Thank you

*****

*****

How to Reference "Securing the Electronic Frontier P. II" Research Paper in a Bibliography

Securing the Electronic Frontier P. II.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/securing-electronic-frontier-p/1141997. Accessed 3 Jul 2024.

Securing the Electronic Frontier P. II (2013). Retrieved from https://www.a1-termpaper.com/topics/essay/securing-electronic-frontier-p/1141997
A1-TermPaper.com. (2013). Securing the Electronic Frontier P. II. [online] Available at: https://www.a1-termpaper.com/topics/essay/securing-electronic-frontier-p/1141997 [Accessed 3 Jul, 2024].
”Securing the Electronic Frontier P. II” 2013. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/securing-electronic-frontier-p/1141997.
”Securing the Electronic Frontier P. II” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/securing-electronic-frontier-p/1141997.
[1] ”Securing the Electronic Frontier P. II”, A1-TermPaper.com, 2013. [Online]. Available: https://www.a1-termpaper.com/topics/essay/securing-electronic-frontier-p/1141997. [Accessed: 3-Jul-2024].
1. Securing the Electronic Frontier P. II [Internet]. A1-TermPaper.com. 2013 [cited 3 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/securing-electronic-frontier-p/1141997
1. Securing the Electronic Frontier P. II. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/securing-electronic-frontier-p/1141997. Published 2013. Accessed July 3, 2024.

Related Research Papers:

Securing the Electronic Frontier Research Paper

Paper Icon

Securing the Electronic Transfer

Securing the Electronic Frontier

The focus of this paper is to provide the annotated biographies of the three articles that focus on the cyber crimes and… read more

Research Paper 3 pages (976 words) Sources: 3 Topic: Military / Army / Navy / Marines


Risk Management and Analysis Process and Policy Before Technology Research Proposal

Paper Icon

released by the FBI and the Computer Security Institute (CSI), over 70% of all attacks on sensitive data and resources reported by organizations occurred from within the organization itself. Implementing… read more

Research Proposal 65 pages (17274 words) Sources: 40 Style: MLA Topic: Computers / IT / Internet


Freedom and Justice Concepts Thesis

Paper Icon

U.S. PATRIOT ACT: WE DESERVE BETTER

Following the events of September 11, 2001, legislation has occurred which has ludicrously removed the rights of citizens instead of serving to bolster and… read more

Thesis 10 pages (3590 words) Sources: 3 Style: APA Topic: Crime / Police / Criminal Justice


Patriot Act vs. Constitutionally Guaranteed Rights Term Paper

Paper Icon

Patriot Act vs. Constitutionally Guaranteed Rights

Patriot Act was passed in haste following the terrorist attacks on the U.S. In 2001. It was reauthorized and amended in 2006. But in… read more

Term Paper 20 pages (6439 words) Sources: 6 Style: Harvard Topic: Crime / Police / Criminal Justice


Comprehensive Study of Offshore Financial Centers and Their Effects on Global Economy Dissertation

Paper Icon

Offshore Financial Centres and Their Effects on Global Economy

The past 3 decades or so have witnessed the proliferation of offshore financial centres that have drawn both criticism and praise… read more

Dissertation 60 pages (22477 words) Sources: 20 Topic: Economics / Finance / Banking


Wed, Jul 3, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!