Research Paper on "Securing the Electronic Frontier P. II"
Research Paper 3 pages (1009 words) Sources: 0
[EXCERPT] . . . .
SECURING THE ELECTRONIC FRONTIER P. IISecuring the Electronic Frontier, P II
Annotated Bibliography
This paper provides the annotated bibliographies of the three articles that focus on the workplace right to privacy and data encryption. McEvoy, (2002) in his article titled "Email and Internet Monitoring and the Workplace: Do Employee has the Right to Privacy" argues that the rapid development of internet and IT (information technology) has made increasing number of employees have access to the internet and email on the employer's owned computers. However, the questions have arisen whether employers have the right to monitor personal communication of employees within workplace. Many employers claim that they have the right to ban employees from using the company computer for personal use. However, this right conflicts with the National Labor Right of 1935 that protects worker's rights. Examples of companies that terminated employees from their companies include Timekeeping Systems Inc., Microsoft, Pratt & Whitney and the issue led to many court cases, which include Smyth v. Pillsbury Company, Tiberino v. Spokane Conty and Kodengada v. International Business Machine Corp. The author suggests that employee should avoid using the company email for personal use.
Miller and Tucker (2011) in their article titled "Encryption and the Loss of Patient Data" point out that fast paced of IT within the healthcare environment has facilitated collection of patient's data. The IT has been very useful for medical providers because it improves the diagnosis and treatment of patients. The downside of the IT use is that firms could face financial
download full paper ⤓
Lugaresi, (2010) in his article "Electronic Privacy in the Workplace: Transparency and Responsibility" argues that the use of the internet and email within a workplace has given rise to collision between employers and employees. Typically, employers need to monitor employee's activities online; however, employees have the right to privacy. With this issue, the law is facing challenges to regulate the use of the email and internet within the workplace. Article 29 of Data Protection Working Party (DPWP) points out that a total ban of employees from personal use of internet within a workplace is impractical considering the importance of the internet as a vital means of communication. However, there is a contrary argument that there is a need to monitor employee to reduce abuse of the internet use. The author concludes that employee do not have the right to use company internet and email for personal use. However, employers should implement an electronic privacy policy in advance… READ MORE
Quoted Instructions for "Securing the Electronic Frontier P. II" Assignment:
Part 1 - Annotated Bibliography (1 page)
Please create annotated bibliography from the attached articles.
Part 2 - Reflective Diary - Securing the Electronic Frontier, Part 2 (2 pages minimum)
Please create record of reflections about experiences, attitudes, opinions, and feelings in relation to the information technology (IT) and cyber ethics. Provide thoughts, feelings, ideas, and emotions.
Please use attached articles and consider these ideas in regards of Securing the Electronic Frontier, Part 2:
The impact of the differences of how encryption is used to secure information and its relationship to Pretty Good Privacy (PGP) within the perspective of IT ethics.
The difference between the concept of trespass and legitimate access as it applies in the real-world application of cyber ethics.
The effect of the technology of encryption code, privacy, and the balance sought by free speech advocates.
Thank you
*****
*****
How to Reference "Securing the Electronic Frontier P. II" Research Paper in a Bibliography
“Securing the Electronic Frontier P. II.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/securing-electronic-frontier-p/1141997. Accessed 3 Jul 2024.
Related Research Papers:
Securing the Electronic Frontier Research Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Securing the Electronic Transfer
Securing the Electronic Frontier
The focus of this paper is to provide the annotated biographies of the three articles that focus on the cyber crimes and… read more
Research Paper 3 pages (976 words) Sources: 3 Topic: Military / Army / Navy / Marines
Risk Management and Analysis Process and Policy Before Technology Research Proposal
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
released by the FBI and the Computer Security Institute (CSI), over 70% of all attacks on sensitive data and resources reported by organizations occurred from within the organization itself. Implementing… read more
Research Proposal 65 pages (17274 words) Sources: 40 Style: MLA Topic: Computers / IT / Internet
Freedom and Justice Concepts Thesis
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
U.S. PATRIOT ACT: WE DESERVE BETTER
Following the events of September 11, 2001, legislation has occurred which has ludicrously removed the rights of citizens instead of serving to bolster and… read more
Thesis 10 pages (3590 words) Sources: 3 Style: APA Topic: Crime / Police / Criminal Justice
Patriot Act vs. Constitutionally Guaranteed Rights Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Patriot Act vs. Constitutionally Guaranteed Rights
Patriot Act was passed in haste following the terrorist attacks on the U.S. In 2001. It was reauthorized and amended in 2006. But in… read more
Term Paper 20 pages (6439 words) Sources: 6 Style: Harvard Topic: Crime / Police / Criminal Justice
Comprehensive Study of Offshore Financial Centers and Their Effects on Global Economy Dissertation
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Offshore Financial Centres and Their Effects on Global Economy
The past 3 decades or so have witnessed the proliferation of offshore financial centres that have drawn both criticism and praise… read more
Dissertation 60 pages (22477 words) Sources: 20 Topic: Economics / Finance / Banking
Wed, Jul 3, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!