Sunday, November 13, 2011

Chapter 6 : Part 2

Name Kayley Cartwright Class time: 12pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 6.4,6.5

1. (Knowledge)Tell three interesting elements of this chapter:

a. “Embezzlement is “fraudulent appropriation of property by a person whom it has been entrusted””(Baase, pg.332).
b. “Supervisors and managers have always monitored their employees. The degree of detail and frequency of the monitoring has varied depending on the kind of work, economic factors, and available technology. Computers have made new kinds of monitoring possible and old methods more efficient” (Baase, pg.335).
c. “The National Labor Relations Board (NLRB) sets rules and decides cases about worker-employer relations. It has been a focus of controversy between unions and employers since its creation more than 60 years ago” (Baase, pg.342).

2.(Comprehension) Summarize what is being discussed within this chapter?

Many companies are allowing their customers to telecommute to work. Telecommuting means that the employee is able to work from anywhere but the office to get the work done. With this increase in telecommuting there is also an increase in work crime and employee monitoring. Even if the employee does not telecommute there is still a possibility the company is watching what the employee is doing on the Internet. There are many ways for an employee to commit a work crime an example would be embezzlement.


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

If the job that the employee is doing involves the computer the company is most likely keeping track of what the employee is doing on that computer. I know that at my work when I first started one of the papers I had to sign was a computer policy. This policy stated that if I were to use a computer it would only be used for work related material and I could possible be tracked on what I was doing. Companies can also check emails, web history, and even voice mail. This is a very good article explaining more about companies tracking employees. http://abcnews.go.com/WNT/story?id=131333&page=1 - .TsCzN65zzqI


4.(Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.


While employee crime has happen a while now, the way it has been done has greatly changed over the years with the changes in technology. Technology has helped employee crime become easier and anonymous. “With the use of computers, trusted employees have stolen hundreds of thousands – in some cases million – of dollars from their employers. Some frauds require specialized knowledge or programming skills. Others do not; employees taking advantage of poor security on their company’s computer systems can commit them” (Baase, pg.332). Without technology, employees stealing from their employers would take great skill and secrecies.

5.(Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

With advancements in technology, companies will find new ways to watch employees and what they are doing on company time. Companies will also have to find many new ways to help protect their company from crime committed by employees.

6.(Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

Many employees need to know that the company they work for will be tracking what they do on company time. This important to know because if the employee does something wrong the company may fire them. As I stated in the answer to question 3, when I started my new job I had to sign a computer policy letting me know that the company will be tracking what I do on the computer. Employee Crime is also relevant to today’s society because there are many ways crime to happen. “Some frauds require specialized knowledge or programming skills. Others do not; employees taking advantage of poor security on their company’s computer systems can commit them” (Baase, pg.333). “Careful screening and background checks on prospective employees can be helpful, although some laws make various kinds of screening more difficult (or completely illegal)” (Baase, pg.334).


References

Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.

http://abcnews.go.com/WNT/story?id=131333&page=1 - .TsCzN65zzqI

No comments:

Post a Comment