信息對應(yīng) 練習(xí)2 Technology in the Workplace Violates Workers’ Privacy.doc_第1頁
信息對應(yīng) 練習(xí)2 Technology in the Workplace Violates Workers’ Privacy.doc_第2頁
信息對應(yīng) 練習(xí)2 Technology in the Workplace Violates Workers’ Privacy.doc_第3頁
信息對應(yīng) 練習(xí)2 Technology in the Workplace Violates Workers’ Privacy.doc_第4頁
全文預(yù)覽已結(jié)束

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)

文檔簡介

Technology in the Workplace Violates Workers PrivacyA We are living in a worid where data, or information, has become a powerful commodity. Massive advances in computer technology are having a two-pronged effect. They are not only making it possible to collect information that at one time went largely unrecorded, but they are also making it relatively easy to store, analyze and retrieve information in ways which, until quite recently, were impossible. It is perhaps not surprising that computer technology is being used in government intelligence agencies to monitor people and practices. However, what is less obvious is the rapid rise in the use of surveillance in companies.BThe amount of information already being collected as a matter of routine would surprise most people. For example, any spending that involves a credit or bank debit card, in fact, most financial transactions, is automatically recorded on computer databases. A telephone call to any government agency, will most likely be monitored. Mobile phone companies have equipment that allows them to track the location of anyone who has a phone switched on. Supermarkets, through their checkout processes, electronically record every item being bought by their customers. Electronic toll-booths and traffic-monitoring systems record the movement of individual vehicles. Closed-circuit television cameras now scan most city centres. The increasing widespread use of surveillance technologies and techniques has led to fears that soon there will be no personal privacy to protect.C These large organizations and companies, however, are not only monitoring their customers, they are just as interested in their employees. A 1997 survey by the American Management Association (AMA) of 900 large companies found that nearly two- thirds admitted to some form of electronic surveillance of their workers. Another AMA survey of 526 companies in 2005 found that more than half of the companies surveyed used video surveillance. 86% of the companies surveyed notified their employees of the practice with 80% notifying the employees of when they are actually being watched. The study found that the number of companies using video surveillance lo monitor employees, on-the-job performance is increasing.DTo employers, video surveillance is a means to expose misconduct, theft, vandalism, violence and even sabotage. It is a way to reduce security risks and legal liability. It is also a cheaper alternative to other forms of security and supervision. However, employeesclaim video surveillance has the potential to dehumanise their working environment, denying them a reasonable expectation of privacy. They also believe it harasses individuals by putting them under constant view.E Another common form of workplace surveillance is to monitor email messages sent or received by employees. According to the American Management Association (AMA) study, the largest increase in workplace surveillance was in the storage and review of email messages. Businesses argue that by monitoring emails they will be able to catch employees who send offensive or abusive email messages. Another assertion commonly used by companies to support the use of email surveillance is that it stops employees from sending confidential files to rival firms. However, this argument does not mean it can stop company secrets from leaking out by other means such as printing, photocopying, photographing or by fax.F Powerful new software makes it easy for bosses to monitor and record not only all e-mail messages, but every keystroke and telephone conversation as well as the exact whereabouts of employees. Tracking devices through mobile phones and on company vehicles can monitor employees,movements outside of the office, while the use of access cards and active badges monitor individuals movements inside the office. According to employers, vehicle tracking is used to increase efficiency, to enhance customer service, for security, and to comply with safety requirements. However, employees complain they do not want their employers secretly tracking their movements. Others resent employers tracking their every movement throughout the day, including during break times. They also fear that tracking devices will be used to unfairly discipline drivers.GThe modern workplace is undergoing great changes caused primarily by the information processing ability of high-powered computers and advanced software. Companies compete against each other and there is intense competition in the marketplace. Anything which might improve a firms efficiency and productivity could mean the difference between success and failure. However, the fact remains, if particular systems can be used to monitor a computer or an individuals movements without the knowledge of the computer user or the person concerned, then it is very likely that such systems will be used for purposes other than their intended purpose.ClassificationAccording to the information in the reading passage, classify the following information as being associated with:Video surveillanceMonitoring emailsTracking devicesWrite the correct letter, A, B, C beside the following statement.1. A cheaper alternative to supervision2. Access cards3

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論