Friday, November 11, 2011

Chapter 6: Part 2


Name Alexandra Esmonde                 Class time: 12-12:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 6.4, 6.5

1.     (Knowledge)Tell three interesting elements of this chapter:
a.        Computers have opened the door for employees to steal large amounts of money from their companies (Baase 333).
b.       Monitoring systems can count every keystroke of clerks (Baase 336).
c.        There is not always a clear distinction between policies of a workplace and the law (Baase 337).

2.     (Comprehension) Summarize what is being discussed within this chapter?
 This chapter discusses the fact that now, more than ever, everything that people do on the computer can, and is being monitored. At work it is now possible to trace every word that an employee types and the employer can read all of it. There is not always a clear distinction between the policies that an employer enforces and the laws that protect privacy.  Employees have used faulty security or their information about their employer's computer systems to steal millions of dollars.  The computer has become an important tool in worker productivity but it has also proven to not be without risks, and sometimes people ask if the risks are greater than the rewards. 


3.     (Application)Name a specific example or NEW solution for this type of problem/similar situation in  society or that you have experienced – be specific and explain?
 I think that there should be higher security on computer's so that workers cannot embezzle money so easily through technology.  If employers cut down on the "monitoring" of their employees every move then I feel as if employees would think twice about stealing money. Companies should put better benefits, or incentives in place to help make sure that their employees are not tempted to steal from them because they are doing fine on their own. New security and a different level of employee employer cooperation and arranging of benefits needs to be put in place as well.


4.     (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter  to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 
 The first step in remedying this problem is evaluating the situation.  After, synthesizing which would be combining the information from all different cases and analyzing what is going wrong and why.  Applying the information that has been gathered and the conclusions that have been drawn to solving the issue. Comprehending what is happening and why is one of the main steps towards solving the problem and finally knowing what to do and why.


5.     (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?
I think the article is relevant because employers monitor their employees and employees do steal from their employers in real life. This just backs up the fact that with new technology there need to be new laws and safeguards in place. People need to be more aware that there are dangers that come with new technology, and things need to be done to protect people against hackers and losing their identity because someone hacked in to their computer.

6.     (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?
 Ethically speaking I do not think that it is ethical to monitor every keystroke that employees make. There needs to be some form of trust that employees will come to work and do their job without needed to be monitored every single second. People need to realize that technology affects humans and humans will be prosecuted in court and the laws need to catch up to the technology.


References
A Gift of Fire By: Sara Baase

No comments:

Post a Comment